VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,257 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: Yes CVSS 7.5/10
    AudioIgniter Music Player <= 2.0.2 - Unauthenticated Insecure Direct Object Reference to 'audioigniter_playlist_id' Parameter

    The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playlist ID via the audioigniter_playlist_id query var or the /audioigniter/playlist/{id}/ rewrite rule and returning playlist track data without performing any authentication, capability, or post_status check — only the post_type is validated. This makes it possible for unauthenticated attackers to view track metadata (titles, artists, audio URLs, buy links, download URLs, and cover images) of any playlist on the site, including those in draft, private, pending, or trash status.

    Published
    May 21, 2026
    Affected Product
    AudioIgniter Music Player
    Plugin · audioigniter
    Affected window
    Versions up to 2.0.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.3
    Recommended next step
    Update to 2.0.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.3, or a newer patched version

    Affected versions
    Versions up to 2.0.2
    Safe / patched versions
    2.0.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Widget Context <= 1.3.3 - Cross-Site Request Forgery to Settings Update via 'wl' Parameter

    The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    May 21, 2026
    Affected Product
    Widget Context
    Plugin · widget-context
    Affected window
    Versions up to 1.3.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.4.0
    Recommended next step
    Update to 1.4.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.4.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.4.0, or a newer patched version

    Affected versions
    Versions up to 1.3.3
    Safe / patched versions
    1.4.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Vedrixa Forms <= 1.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Form Structure Modification via wefb_save_form_structure AJAX Action

    The Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the structure of any form — adding, removing, or altering fields — by writing attacker-controlled data to the plugin's FORMS database table. The 'ajax-nonce' nonce used by this handler is injected into the public frontend via wp_localize_script(), so any authenticated user who visits a page containing a form shortcode can obtain it without any elevated access.

    Published
    May 21, 2026
    Affected Product
    Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder
    Plugin · vedrixa-forms-registration-builder
    Affected window
    Versions up to 1.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.0
    Recommended next step
    Update to 1.2.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.0, or a newer patched version

    Affected versions
    Versions up to 1.1.1
    Safe / patched versions
    1.2.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Slider by Soliloquy <= 2.8.1 - Authenticated (Subscriber+) Information Disclosure via REST API Endpoint

    The Slider by Soliloquy – Responsive Image Slider for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.1 via the map_meta_cap. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract draft slider metadata including unpublished media URLs, captions, and slider configuration authored by administrators or editors.

    Published
    May 21, 2026
    Affected Product
    Slider by Soliloquy – Responsive Image Slider for WordPress
    Plugin · soliloquy-lite
    Affected window
    Versions up to 2.8.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.8.2
    Recommended next step
    Update to 2.8.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.8.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.8.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.8.2, or a newer patched version

    Affected versions
    Versions up to 2.8.1
    Safe / patched versions
    2.8.2
  • Plugin Medium Patched: Yes CVSS 5.3/10
    MotoPress Hotel Booking <= 6.0.1 - Missing Authorization to Unauthenticated Arbitrary Booking Notes Modification via mphb_update_booking_notes AJAX Action

    The MotoPress Hotel Booking plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 6.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite or delete the internal notes (_mphb_booking_internal_notes) of any booking by supplying an arbitrary booking ID. The nonce for this action is output in the HTML source of every public page through wp_localize_script (MPHB._data.nonces), so any unauthenticated visitor can obtain a valid nonce and perform the action without any account or prior interaction.

    Published
    May 21, 2026
    Affected Product
    MotoPress Hotel Booking
    Plugin · motopress-hotel-booking-lite
    Affected window
    Versions up to 6.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.0.2
    Recommended next step
    Update to 6.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 6.0.2, or a newer patched version

    Affected versions
    Versions up to 6.0.1
    Safe / patched versions
    6.0.2
  • Plugin Medium Patched: Yes CVSS 5.4/10
    FluentCRM <= 2.9.87 - Unauthenticated Blind Server-Side Request Forgery via 'SubscribeURL' Parameter

    The FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.9.87 via the 'SubscribeURL' parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Exploitation requires that the SES bounce handling key ('_fc_bounce_key') has never been stored (i.e., the site is in its default/unconfigured state with respect to SES bounce handling) as visiting the bounce configuration page auto-generates and stores a random key that causes the authentication check to evaluate correctly and reject unauthenticated requests.

    Published
    May 21, 2026
    Affected Product
    FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution
    Plugin · fluent-crm
    Affected window
    Versions up to 2.9.87
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.0.0
    Recommended next step
    Update to 3.0.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.9.87
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.0.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.0.0, or a newer patched version

    Affected versions
    Versions up to 2.9.87
    Safe / patched versions
    3.0.0
  • Plugin Medium Patched: Yes CVSS 6.4/10
    The Plus Addons for Elementor <= 6.4.11 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Widget Custom Attributes

    The Plus Addons for Elementor plugin for WordPress was vulnerable to Authenticated (Contributor+) Stored Cross-Site Scripting via the Button widget's `custom_attributes` setting in versions up to and including 6.4.11. The `render` function in `modules/widgets/tp_button.php` passed the raw `custom_attributes` string through `tp_senitize_js_input()`. This filter is bypassable. The issue is patched in version 6.4.12.

    Published
    May 21, 2026
    Affected Product
    The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce
    Plugin · the-plus-addons-for-elementor-page-builder
    Affected window
    Versions up to 6.4.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.4.12
    Recommended next step
    Update to 6.4.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.4.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.4.12
    Update to this version or a newer safe release.
    What to do

    Update to version 6.4.12, or a newer patched version

    Affected versions
    Versions up to 6.4.11
    Safe / patched versions
    6.4.12
  • Plugin High Patched: Yes CVSS 7.5/10
    Ditty <= 3.1.65 - Missing Authorization to Unauthenticated Sensitive Information Disclosure via ditty_init AJAX Action

    The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to retrieve the full item content of non-public Dittys — including drafts, pending, scheduled, and disabled entries — by enumerating integer post IDs against the ditty_init AJAX endpoint. Unlike the non-AJAX init() counterpart, init_ajax() does not verify that the requested Ditty has a 'publish' post status before loading and returning its items, allowing content that administrators explicitly withheld from public view to be extracted.

    Published
    May 21, 2026
    Affected Product
    Ditty – Responsive News Tickers, Sliders, and Lists
    Plugin · ditty-news-ticker
    Affected window
    Versions up to 3.1.65
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.66
    Recommended next step
    Update to 3.1.66
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.65
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.66
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.66, or a newer patched version

    Affected versions
    Versions up to 3.1.65
    Safe / patched versions
    3.1.66
  • Plugin Medium Patched: No CVSS 4.3/10
    Alfie <= 1.2.1 - Cross-Site Request Forgery to Feed Deletion via 'delete' Parameter

    The Alfie – Feed Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the alfie_manage() function which handles feed deletion via the 'delete' GET parameter. This makes it possible for unauthenticated attackers to delete arbitrary plugin feed data (from alfie_colindex, alfie_producten, alfie_reactions, and alfie_searchproduct tables) via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    May 21, 2026
    Affected Product
    Alfie – Feed Plugin
    Plugin · alfie-the-productfeedtool-wp-plugin
    Affected window
    Versions up to 1.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.2.1
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: No CVSS 6.1/10
    WP Blockade <= 0.9.14 - Reflected Cross-Site Scripting via 'shortcode' Parameter

    The WP Blockade plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcode' parameter in all versions up to and including 0.9.14. This is due to insufficient input sanitization and output escaping in the render_shortcode_preview() function. The function receives user input from $_GET['shortcode'], passes it through stripslashes() without any sanitization, and then outputs it directly via echo do_shortcode($shortcode) on line 393. When the input is not a valid WordPress shortcode (e.g., an HTML tag with JavaScript event handlers), do_shortcode() returns it unchanged, and it is reflected into the page without escaping. The endpoint is registered via admin_post_ (not admin_post_nopriv_), meaning it requires the user to be logged in with at minimum a Subscriber-level account. There is no nonce verification or additional capability check. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute if they can successfully trick a user into performing an action such as clicking a link.

    Published
    May 21, 2026
    Affected Product
    WP Blockade – Visual Page Builder
    Plugin · wp-blockade
    Affected window
    Versions up to 0.9.14
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 0.9.14
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 0.9.14
    Safe / patched versions
    No safe version is published yet.
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,257 indexed records 14,568 tracked plugins 1,634 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog