VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,494 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 4.4/10
    Website LLMs.txt <= 8.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting

    The Website LLMs.txt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 8.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

    Published
    Apr 20, 2026
    Affected Product
    Website LLMs.txt
    Plugin · website-llms-txt
    Affected window
    Versions up to 8.2.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.2.7
    Recommended next step
    Update to 8.2.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.2.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.2.7
    Update to this version or a newer safe release.
    What to do

    Update to version 8.2.7, or a newer patched version

    Affected versions
    Versions up to 8.2.6
    Safe / patched versions
    8.2.7
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Responsive Blocks <= 2.2.1 - Missing Authorization to Authenticated (Contributor+) Arbitrary Modification via AJAX Actions

    The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.2.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with contributor-level access and above, to modify global site-wide plugin configuration options, including toggling custom CSS, disabling blocks, changing layout defaults such as content width, container padding, and container gap, and altering auto-block-recovery behavior.

    Published
    Apr 20, 2026
    Affected Product
    Responsive Blocks – Page Builder for Blocks & Patterns
    Plugin · responsive-block-editor-addons
    Affected window
    2.0.9 through 2.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.2.2
    Recommended next step
    Update to 2.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    2.0.9 through 2.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.2.2, or a newer patched version

    Affected versions
    2.0.9 through 2.2.1
    Safe / patched versions
    2.2.2
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Responsive Blocks <= 2.2.0 - Unauthenticated Open Email Relay via REST API 'email_to' Parameter

    The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to Unauthenticated Open Email Relay in all versions up to, and including, 2.2.0. This is due to insufficient authorization checks and missing server-side validation of the recipient email address supplied via a public REST API route. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient of their choosing through the affected WordPress site's mail server, effectively turning the site into an open mail relay.

    Published
    Apr 20, 2026
    Affected Product
    Responsive Blocks – Page Builder for Blocks & Patterns
    Plugin · responsive-block-editor-addons
    Affected window
    Versions up to 2.2.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.2.1
    Recommended next step
    Update to 2.2.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.2.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.2.1
    Update to this version or a newer safe release.
    What to do

    Update to version 2.2.1, or a newer patched version

    Affected versions
    Versions up to 2.2.0
    Safe / patched versions
    2.2.1
  • Plugin Medium Patched: No CVSS 6.5/10
    Plugin: CMS für Motorrad Werkstätten <= 1.0.0 - Authenticated (Subscriber+) SQL Injection via 'arttype' Parameter

    The Plugin: CMS für Motorrad Werkstätten plugin for WordPress is vulnerable to SQL Injection via the 'arttype' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Apr 20, 2026
    Affected Product
    Plugin: CMS für Motorrad Werkstätten
    Plugin · cms-fuer-motorrad-werkstaetten
    Affected window
    Versions up to 1.0.0
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.0.0
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 4.7/10
    wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin <= 6.5.0.4 - Unauthenticated Stored Cross-Site Scripting via CSV/Excel Data Import

    The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.5.0.4. This is due to insufficient input sanitization and output escaping in the prepareCellOutput() method of the LinkWDTColumn, ImageWDTColumn, and EmailWDTColumn classes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, given that they can trick an Administrator into importing data from an attacker-controlled source and the affected column types (Link, Image, or Email) are configured.

    Published
    Apr 20, 2026
    Affected Product
    wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin
    Plugin · wpdatatables
    Affected window
    Versions up to 6.5.0.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.5.0.5
    Recommended next step
    Update to 6.5.0.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.5.0.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.5.0.5
    Update to this version or a newer safe release.
    What to do

    Update to version 6.5.0.5, or a newer patched version

    Affected versions
    Versions up to 6.5.0.4
    Safe / patched versions
    6.5.0.5
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Image Source Control Lite – Show Image Credits and Captions <= 3.9.1 - Authenticated (Author+) Stored Cross-Site Scripting via 'Image Source' Field

    The Image Source Control Lite – Show Image Credits and Captions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Image Source' attachment field in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 20, 2026
    Affected Product
    Image Source Control Lite – Show Image Credits and Captions
    Plugin · image-source-control-isc
    Affected window
    Versions up to 3.9.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.2
    Recommended next step
    Update to 3.9.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.2, or a newer patched version

    Affected versions
    Versions up to 3.9.1
    Safe / patched versions
    3.9.2
  • Plugin High Patched: Yes CVSS 8.1/10
    Everest Forms <= 3.4.4 - Unauthenticated Arbitrary File Read and Deletion via Upload Field 'old_files' Parameter

    The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3.4.4. This is due to the plugin trusting attacker-controlled old_files data from public form submissions as legitimate server-side upload state, and converting attacker-supplied URLs into local filesystem paths using regex-based string replacement without canonicalization or directory boundary enforcement. This makes it possible for unauthenticated attackers to read arbitrary local files (e.g., wp-config.php) by injecting path-traversal payloads into the old_files upload field parameter, which are then attached to notification emails. The same path resolution is also used in the post-email cleanup routine, which calls unlink() on the resolved path, resulting in the targeted file being deleted after being attached. This can lead to full site compromise through disclosure of database credentials and authentication salts from wp-config.php, and denial of service through deletion of critical files. Prerequisite: The form must contain a file-upload or image-upload field, and disable storing entry information.

    Published
    Apr 20, 2026
    Affected Product
    Everest Forms – Contact Form, Payment Form, Quiz, Survey & Custom Form Builder
    Plugin · everest-forms
    Affected window
    Versions up to 3.4.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.5
    Recommended next step
    Update to 3.4.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.4.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.5
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.5, or a newer patched version

    Affected versions
    Versions up to 3.4.4
    Safe / patched versions
    3.4.5
  • Plugin High Patched: Yes CVSS 8.1/10
    wpForo Forum <= 3.0.5 - Authenticated (Subscriber+) Arbitrary File Deletion via Custom Profile Field File Path

    The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.5. This is due to two compounding flaws: the Members::update() method does not validate or restrict the value of file-type custom profile fields, allowing authenticated users to store an arbitrary path instead of a legitimate upload path; and the wpforo_fix_upload_dir() sanitization function in ucf_file_delete() only remaps paths that match the expected pattern, and it is passed directly to the unlink() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Note: The vulnerability requires a file custom field, which requires the wpForo - User Custom Fields addon plugin.

    Published
    Apr 20, 2026
    Affected Product
    wpForo Forum
    Plugin · wpforo
    Affected window
    Versions up to 3.0.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.0.6
    Recommended next step
    Update to 3.0.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.0.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.0.6
    Update to this version or a newer safe release.
    What to do

    Update to version 3.0.6, or a newer patched version

    Affected versions
    Versions up to 3.0.5
    Safe / patched versions
    3.0.6
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Website LLMs.txt <= 8.2.6 - Reflected Cross-Site Scripting

    The Website LLMs.txt plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 8.2.6. This is due to the use of filter_input() without a sanitization filter and insufficient output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

    Published
    Apr 20, 2026
    Affected Product
    Website LLMs.txt
    Plugin · website-llms-txt
    Affected window
    Versions up to 8.2.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.2.7
    Recommended next step
    Update to 8.2.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.2.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.2.7
    Update to this version or a newer safe release.
    What to do

    Update to version 8.2.7, or a newer patched version

    Affected versions
    Versions up to 8.2.6
    Safe / patched versions
    8.2.7
  • Plugin Medium Patched: Yes CVSS 6.4/10
    EMC Scheduling Manager <= 4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via calendly Shortcode

    The EMC – Easily Embed Calendly Scheduling Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's calendly shortcode in all versions up to, and including, 4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 18, 2026
    Affected Product
    EMC – Easily Embed Calendly Scheduling
    Plugin · embed-calendly-scheduling
    Affected window
    Versions up to 4.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.5
    Recommended next step
    Update to 4.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.5
    Update to this version or a newer safe release.
    What to do

    Update to version 4.5, or a newer patched version

    Affected versions
    Versions up to 4.4
    Safe / patched versions
    4.5
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,494 indexed records 14,406 tracked plugins 1,568 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog