VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,889 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: Yes CVSS 7.2/10
    Query Monitor <= 3.20.3 - Reflected Cross-Site Scripting via Request URI

    The Query Monitor – The developer tools panel for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘$_SERVER['REQUEST_URI']’ parameter in all versions up to, and including, 3.20.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Query Monitor – The developer tools panel for WordPress
    Plugin · query-monitor
    Affected window
    Versions up to 3.20.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.20.4
    Recommended next step
    Update to 3.20.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.20.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.20.4
    Update to this version or a newer safe release.
    What to do

    Update to version 3.20.4, or a newer patched version

    Affected versions
    Versions up to 3.20.3
    Safe / patched versions
    3.20.4
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Minify HTML <= 2.1.12 - Cross-Site Request Forgery to Plugin Settings Update

    The Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.12. This is due to missing or incorrect nonce validation on the 'minify_html_menu_options' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Minify HTML
    Plugin · minify-html-markup
    Affected window
    Versions up to 2.1.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.13
    Recommended next step
    Update to 2.1.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.13
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.13, or a newer patched version

    Affected versions
    Versions up to 2.1.12
    Safe / patched versions
    2.1.13
  • Plugin Medium Patched: Yes CVSS 4.3/10
    User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor <= 3.15.5 - Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary Post Author Reassignment via Avatar Field

    The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.15.5 via the wppb_save_avatar_value() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to reassign ownership of arbitrary posts and attachments by changing 'post_author'.

    Published
    Mar 30, 2026
    Affected Product
    User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
    Plugin · profile-builder
    Affected window
    Versions up to 3.15.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.15.6
    Recommended next step
    Update to 3.15.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.15.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.15.6
    Update to this version or a newer safe release.
    What to do

    Update to version 3.15.6, or a newer patched version

    Affected versions
    Versions up to 3.15.5
    Safe / patched versions
    3.15.6
  • Plugin Medium Patched: No CVSS 6.1/10
    Auto Post Scheduler <= 1.84 - Cross-Site Request Forgery to Stored Cross-Site Scripting via aps_options_page

    The Auto Post Scheduler plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.84. This is due to missing nonce validation on the 'aps_options_page' function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Auto Post Scheduler
    Plugin · auto-post-scheduler
    Affected window
    Versions up to 1.84
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.84
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.84
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Ibtana - WordPress Website Builder <= 1.2.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

    The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ive' shortcode in all versions up to, and including, 1.2.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 30, 2026
    Affected Product
    Ibtana – WordPress Website Builder
    Plugin · ibtana-visual-editor
    Affected window
    Versions up to 1.2.5.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.5.8
    Recommended next step
    Update to 1.2.5.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.5.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.5.8
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.5.8, or a newer patched version

    Affected versions
    Versions up to 1.2.5.7
    Safe / patched versions
    1.2.5.8
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Truebooker - Appointment Booking and Scheduler Plugin <= 1.1.4 - Sensitive Information Exposure via Views Files

    The Appointment Booking and Scheduler Plugin – Truebooker plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.4 through views php files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed views php files via direct access.

    Published
    Mar 30, 2026
    Affected Product
    Truebooker – Appointment Booking and Scheduler System
    Plugin · truebooker-appointment-booking
    Affected window
    Versions up to 1.1.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.5
    Recommended next step
    Update to 1.1.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.5, or a newer patched version

    Affected versions
    Versions up to 1.1.4
    Safe / patched versions
    1.1.5
  • Plugin Medium Patched: Yes CVSS 6.5/10
    WooPayments <= 10.5.1 - Missing Authorization to Unauthenticated Plugin Settings Update via save_upe_appearance_ajax

    The WooPayments: Integrated WooCommerce Payments plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_upe_appearance_ajax' function in all versions up to, and including, 10.5.1. This makes it possible for unauthenticated attackers to update plugin settings.

    Published
    Mar 30, 2026
    Affected Product
    WooPayments: Integrated WooCommerce Payments
    Plugin · woocommerce-payments
    Affected window
    Versions up to 10.5.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 10.6.0
    Recommended next step
    Update to 10.6.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 10.5.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    10.6.0
    Update to this version or a newer safe release.
    What to do

    Update to version 10.6.0, or a newer patched version

    Affected versions
    Versions up to 10.5.1
    Safe / patched versions
    10.6.0
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Loco Translate <= 2.8.2 - Reflected Cross-Site Scripting via 'update_href' Parameter

    The Loco Translate plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘update_href’ parameter in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Loco Translate
    Plugin · loco-translate
    Affected window
    Versions up to 2.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.8.3
    Recommended next step
    Update to 2.8.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.8.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.8.3, or a newer patched version

    Affected versions
    Versions up to 2.8.2
    Safe / patched versions
    2.8.3
  • Plugin High Patched: Yes CVSS 7.5/10
    Gravity SMTP <= 2.1.4 - Unauthenticated Sensitive Information Exposure via REST API

    The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, the plugin's register_connector_data() method populates internal connector data, causing the endpoint to return approximately 365 KB of JSON containing the full System Report. This makes it possible for unauthenticated attackers to retrieve detailed system configuration data including PHP version, loaded extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with versions, active theme, WordPress configuration details, database table names, and any API keys/tokens configured in the plugin.

    Published
    Mar 30, 2026
    Affected Product
    Gravity SMTP
    Plugin · gravitysmtp
    Affected window
    Versions up to 2.1.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.5
    Recommended next step
    Update to 2.1.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.5, or a newer patched version

    Affected versions
    Versions up to 2.1.4
    Safe / patched versions
    2.1.5
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Everest Forms Pro <= 1.9.12 - Unauthenticated Remote Code Execution via Calculation Field

    The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not escape single quotes or other PHP code context characters. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code on the server by submitting a crafted value in any string-type form field (text, email, URL, select, radio) when a form uses the "Complex Calculation" feature.

    Published
    Mar 30, 2026
    Affected Product
    Everest Forms Pro
    Plugin · everest-forms-pro
    Affected window
    Versions up to 1.9.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.9.13
    Recommended next step
    Update to 1.9.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.9.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.9.13
    Update to this version or a newer safe release.
    What to do

    Update to version 1.9.13, or a newer patched version

    Affected versions
    Versions up to 1.9.12
    Safe / patched versions
    1.9.13
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,889 indexed records 14,308 tracked plugins 1,501 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog