VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,484 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    Contextual Related Posts <= 4.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'other_attributes'

    The Contextual Related Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'other_attributes' parameter in versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Contextual Related Posts
    Plugin · contextual-related-posts
    Affected window
    Versions up to 4.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.2
    Recommended next step
    Update to 4.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.2, or a newer patched version

    Affected versions
    Versions up to 4.2.1
    Safe / patched versions
    4.2.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Content Blocks (Custom Post Widget) <= 3.3.9 - Authenticated (Author+) Stored Cross-Site Scripting via content_block Shortcode

    The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's content_block shortcode in all versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping on user supplied values consumed from user-created content blocks. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Content Blocks (Custom Post Widget)
    Plugin · custom-post-widget
    Affected window
    Versions up to 3.3.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.1
    Recommended next step
    Update to 3.4.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.3.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.1, or a newer patched version

    Affected versions
    Versions up to 3.3.9
    Safe / patched versions
    3.4.1
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Categories Images <= 3.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'z_taxonomy_image' Shortcode

    The Categories Images plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 3.3.1, via the 'z_taxonomy_image' shortcode. This is due to the shortcode rendering path passing attacker-controlled class input into a fallback image builder that concatenates HTML attributes without proper escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts that execute when users interact with the injected frontend page via the 'class' shortcode attribute.

    Published
    Apr 17, 2026
    Affected Product
    Categories Images
    Plugin · categories-images
    Affected window
    Versions up to 3.3.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.3.2
    Recommended next step
    Update to 3.3.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.3.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.3.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.3.2, or a newer patched version

    Affected versions
    Versions up to 3.3.1
    Safe / patched versions
    3.3.2
  • Plugin High Patched: Yes CVSS 8.8/10
    CMP – Coming Soon & Maintenance Plugin by NiteoThemes <= 4.1.16 - Missing Authorization to Authenticated (Administrator+) Arbitrary File Upload and Remote Code Execution

    The CMP – Coming Soon & Maintenance Plugin by NiteoThemes plugin for WordPress is vulnerable to arbitrary file upload and remote code execution in all versions up to, and including, 4.1.16 via the `cmp_theme_update_install` AJAX action. This is due to the function only checking for the `publish_pages` capability (available to Editors and above) instead of `manage_options` (Administrators only), combined with a lack of proper validation on the user-supplied file URL and no verification of the downloaded file's content before extraction. This makes it possible for authenticated attackers, with Administrator-level access and above, to force the server to download and extract a malicious ZIP file from a remote attacker-controlled URL into a web-accessible directory (`wp-content/plugins/cmp-premium-themes/`), resulting in remote code execution. Due to the lack of a nonce for Editors, they are unable to exploit this vulnerability.

    Published
    Apr 17, 2026
    Affected Product
    CMP – Coming Soon & Maintenance Plugin by NiteoThemes
    Plugin · cmp-coming-soon-maintenance
    Affected window
    Versions up to 4.1.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.1.17
    Recommended next step
    Update to 4.1.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.1.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.1.17
    Update to this version or a newer safe release.
    What to do

    Update to version 4.1.17, or a newer patched version

    Affected versions
    Versions up to 4.1.16
    Safe / patched versions
    4.1.17
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Page Builder Gutenberg Blocks <= 3.1.16 - Authenticated (Contributor+) Stored Cross-Site Scripting via External iCal Feed Data

    The Page Builder Gutenberg Blocks – CoBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via external iCal feed data in all versions up to, and including, 3.1.16 due to insufficient output escaping of event titles, descriptions, and locations fetched from external iCal feeds in the Events block rendering function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Page Builder Gutenberg Blocks – CoBlocks
    Plugin · coblocks
    Affected window
    Versions up to 3.1.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.17
    Recommended next step
    Update to 3.1.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.17
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.17, or a newer patched version

    Affected versions
    Versions up to 3.1.16
    Safe / patched versions
    3.1.17
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Flipbox Addon for Elementor <= 2.1.1 - Authenticated (Author+) Stored Cross-Site Scripting via Custom Attributes

    The Flipbox Addon for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flipbox widget's button URL `custom_attributes` field in all versions up to, and including, 2.1.1 due to insufficient validation of custom attribute names. Specifically, the plugin uses `esc_html()` on the attribute name which does not prevent event handler attributes (e.g., `onmouseover`, `onclick`). This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Flipbox Addon for Elementor
    Plugin · ultimate-flipbox-addon-for-elementor
    Affected window
    Versions up to 2.0.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.2
    Recommended next step
    Update to 2.1.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.2, or a newer patched version

    Affected versions
    Versions up to 2.0.8
    Safe / patched versions
    2.1.2
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Hostel <= 1.1.6 - Reflected Cross-Site Scripting via 'shortcode_id' Parameter

    The Hostel plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcode_id' parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Apr 17, 2026
    Affected Product
    Hostel
    Plugin · hostel
    Affected window
    Versions up to 1.1.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.7
    Recommended next step
    Update to 1.1.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.7
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.7, or a newer patched version

    Affected versions
    Versions up to 1.1.6
    Safe / patched versions
    1.1.7
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'checkin_place_id' Parameter

    The Youzify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'checkin_place_id' parameter in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress
    Plugin · youzify
    Affected window
    Versions up to 1.3.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.7
    Recommended next step
    Update to 1.3.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.7
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.7, or a newer patched version

    Affected versions
    Versions up to 1.3.6
    Safe / patched versions
    1.3.7
  • Plugin High Patched: Yes CVSS 7.5/10
    Easy Appointments <= 3.12.21 - Unauthenticated Sensitive Information Exposure via REST API

    The Easy Appointments plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.12.21 via the `/wp-json/wp/v2/eablocks/ea_appointments/` REST API endpoint. This is due to the endpoint being registered with `'permission_callback' => '__return_true'`, which allows access without any authentication or authorization checks. This makes it possible for unauthenticated attackers to extract sensitive customer appointment data including full names, email addresses, phone numbers, IP addresses, appointment descriptions, and pricing information.

    Published
    Apr 17, 2026
    Affected Product
    Easy Appointments
    Plugin · easy-appointments
    Affected window
    Versions up to 3.12.21
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.12.22
    Recommended next step
    Update to 3.12.22
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.12.21
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.12.22
    Update to this version or a newer safe release.
    What to do

    Update to version 3.12.22, or a newer patched version

    Affected versions
    Versions up to 3.12.21
    Safe / patched versions
    3.12.22
  • Plugin Medium Patched: No CVSS 6.4/10
    Pz-LinkCard <= 2.5.8.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

    The Pz-LinkCard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'blogcard' shortcode attributes in all versions up to, and including, 2.5.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 17, 2026
    Affected Product
    Pz-LinkCard
    Plugin · pz-linkcard
    Affected window
    Versions up to 2.5.8.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.5.8.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 2.5.8.1
    Safe / patched versions
    No safe version is published yet.
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,484 indexed records 14,406 tracked plugins 1,568 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog