VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,233 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 5.3/10
    Slider Revolution <= 7.0.9 - Unauthenticated Sensitive Information Exposure via 'sliders/stream'

    The Slider Revolution plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.0.9 via the 'get_stream_data()' function. This makes it possible for unauthenticated attackers to extract sensitive data including published password-protected post, page, and product content.

    Published
    May 19, 2026
    Affected Product
    Slider Revolution
    Plugin · revslider
    Affected window
    Versions up to 7.0.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 7.0.10
    Recommended next step
    Update to 7.0.10
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.0.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.0.10
    Update to this version or a newer safe release.
    What to do

    Update to version 7.0.10, or a newer patched version

    Affected versions
    Versions up to 7.0.9
    Safe / patched versions
    7.0.10
  • Plugin High Patched: Yes CVSS 8.8/10
    AcyMailing <= 10.8.2 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation via 'acymailing_router'

    The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify privileged AcyMailing configuration, export subscriber secret keys, and chain these actions into administrator account takeover when a target administrator email address is known.

    Published
    May 19, 2026
    Affected Product
    AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress
    Plugin · acymailing
    Affected window
    Versions up to 10.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 10.9.0
    Recommended next step
    Update to 10.9.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 10.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    10.9.0
    Update to this version or a newer safe release.
    What to do

    Update to version 10.9.0, or a newer patched version

    Affected versions
    Versions up to 10.8.2
    Safe / patched versions
    10.9.0
  • Plugin Medium Patched: No CVSS 4.3/10
    Anomify AI <= 0.3.6 - Cross-Site Request Forgery

    The Anomify AI – Anomaly Detection and Alerting plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) in versions up to and including 0.3.6. This is due to missing nonce verification on the settings page handler and insufficient output escaping in the admin_options.php template. The settings form includes no wp_nonce_field() and the handler performs no check_admin_referer() check, meaning any cross-origin POST can modify plugin settings. The API key field is sanitized only with sanitize_text_field(), which strips HTML tags but does not encode double-quote characters; the value is then rendered into an HTML attribute via bare echo without esc_attr(), allowing a double-quote attribute-escape payload to survive both sanitization and storage. This makes it possible for unauthenticated attackers to inject arbitrary web scripts by tricking a logged-in administrator into visiting a malicious page that submits a forged request, storing the payload in the database and causing it to execute in the administrator's browser whenever the plugin settings page is visited.

    Published
    May 19, 2026
    Affected Product
    Anomify AI – Anomaly Detection and Alerting
    Plugin · anomify
    Affected window
    Versions up to 0.3.6
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 0.3.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 0.3.6
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 6.4/10
    AI Chatbot & Workflow Automation by AIWU <= 1.4.14 - Unauthenticated Stored Cross-Site Scripting via 'X-Forwarded-For' Header

    The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-Forwarded-For' header in versions up to, and including, 1.4.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: Practical exploitation is constrained due to a 20-character storage limit.

    Published
    May 19, 2026
    Affected Product
    AI Chatbot & Workflow Automation by AIWU
    Plugin · ai-copilot-content-generator
    Affected window
    Versions up to 1.4.14
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.4.15
    Recommended next step
    Update to 1.4.15
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.4.14
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.4.15
    Update to this version or a newer safe release.
    What to do

    Update to version 1.4.15, or a newer patched version

    Affected versions
    Versions up to 1.4.14
    Safe / patched versions
    1.4.15
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Photo Gallery, Sliders, Proofing and Themes <= 4.2.0 - Insecure Direct Object Reference to Authenticated (Subscriber+) Image Deletion via REST API

    The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 4.2.0. This is due to insufficient object-level authorization in the image deletion REST flow where the permission callback for DELETE /imagely/v1/images/{id} only checks 'NextGEN Manage gallery' permissions and does not enforce gallery ownership or 'NextGEN Manage others gallery' permissions. This makes it possible for authenticated attackers, with Subscriber-level privileges and 'NextGEN Manage gallery' capability, to delete gallery images belonging to other users as well as their associated image files from disk when deleteImg is enabled (default).

    Published
    May 19, 2026
    Affected Product
    Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
    Plugin · nextgen-gallery
    Affected window
    Versions up to 4.2.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.1
    Recommended next step
    Update to 4.2.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.1, or a newer patched version

    Affected versions
    Versions up to 4.2.0
    Safe / patched versions
    4.2.1
  • Plugin High Patched: Yes CVSS 8.8/10
    Advanced Database Cleaner – Premium <= 4.1.0 - Authenticated (Subscriber+) Local File Inclusion via 'template'

    The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 4.1.0 via the 'template' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

    Published
    May 19, 2026
    Affected Product
    Advanced Database Cleaner – Premium
    Plugin · advanced-database-cleaner-premium
    Affected window
    Versions up to 4.1.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.1.1
    Recommended next step
    Update to 4.1.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.1.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.1.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.1.1, or a newer patched version

    Affected versions
    Versions up to 4.1.0
    Safe / patched versions
    4.1.1
  • Plugin High Patched: Yes CVSS 7.2/10
    Cost of Goods by PixelYourSite <= 1.2.12 - Unauthenticated Stored Cross-Site Scripting via Cost of Goods Import

    The Cost of Goods by PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'csvdata[0][cost_of_goods_value]' parameter in versions up to, and including, 1.2.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 19, 2026
    Affected Product
    Cost of Goods by PixelYourSite
    Plugin · pixel-cost-of-goods
    Affected window
    Versions up to 1.2.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.13
    Recommended next step
    Update to 1.2.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.13
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.13, or a newer patched version

    Affected versions
    Versions up to 1.2.12
    Safe / patched versions
    1.2.13
  • Plugin Medium Patched: Yes CVSS 4.3/10
    All in One SEO <= 4.9.7 - Authenticated (Contributor+) Sensitive Information Exposure via 'internalOptions' Localized Script Data

    The All in One SEO plugin for WordPress is vulnerable to Sensitive Information Exposure via 'internalOptions' localized script data in versions up to, and including, 4.9.7 due to sensitive internal option data being passed to wp_localize_script() in post editor contexts without effective masking for low-privilege users. This makes it possible for authenticated attackers, with contributor-level access and above, to view configured API/OAuth tokens and license-related values from page source.

    Published
    May 19, 2026
    Affected Product
    All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
    Plugin · all-in-one-seo-pack
    Affected window
    Versions up to 4.9.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.9.7.1
    Recommended next step
    Update to 4.9.7.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.9.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.9.7.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.9.7.1, or a newer patched version

    Affected versions
    Versions up to 4.9.7
    Safe / patched versions
    4.9.7.1
  • Plugin High Patched: Yes CVSS 7.5/10
    Boost <= 2.0.3 - Unauthenticated Blind SQL Injection via Multiple Parameters

    The Boost plugin for WordPress is vulnerable to time-based SQL Injection via the 'current_url' and 'user_name' parameters in versions up to, and including, 2.0.3 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 19, 2026
    Affected Product
    Boost
    Plugin · boost
    Affected window
    Versions up to 2.0.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.4
    Recommended next step
    Update to 2.0.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.4
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.4, or a newer patched version

    Affected versions
    Versions up to 2.0.3
    Safe / patched versions
    2.0.4
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Boost <= 2.0.3 - Unauthenticated PHP Object Injection via STYXKEY-BOOST_USER_LOCATION Cookie

    The Boost plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.0.3 via deserialization of untrusted input in the STYXKEY-BOOST_USER_LOCATION cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

    Published
    May 19, 2026
    Affected Product
    Boost
    Plugin · boost
    Affected window
    Versions up to 2.0.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.4
    Recommended next step
    Update to 2.0.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.4
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.4, or a newer patched version

    Affected versions
    Versions up to 2.0.3
    Safe / patched versions
    2.0.4
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,233 indexed records 14,558 tracked plugins 1,633 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog