VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,164 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Critical Patched: No CVSS 9.8/10
    Piotnet Addons for Elementor Pro <= 7.1.70 - Unauthenticated Arbitrary File Upload via Form File Upload

    The Piotnet Addons for Elementor Pro plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the 'pafe_ajax_form_builder' function in all versions up to, and including, 7.1.70. The plugin uses an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit can only be exploited if a file field is added to the form.

    Published
    May 18, 2026
    Affected Product
    Piotnet Addons For Elementor Pro
    Plugin · piotnet-addons-for-elementor-pro
    Affected window
    Versions up to 7.1.70
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.1.70
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 7.1.70
    Safe / patched versions
    No safe version is published yet.
  • Plugin Critical Patched: No CVSS 9.8/10
    Piotnet Forms <= 2.1.40 - Unauthenticated Arbitrary File Upload via Form File Upload

    The Piotnet Forms plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the 'piotnetforms_ajax_form_builder' function in all versions up to, and including, 2.1.40. The plugin uses an incomplete extension blacklist that only blocks php, phpt, php5, php7, and exe extensions, while allowing dangerous extensions such as .phar or .phtml to be uploaded. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit can only be exploited if a file field is added to the form.

    Published
    May 18, 2026
    Affected Product
    Piotnet Forms
    Plugin · piotnetforms-pro
    Affected window
    Versions up to 2.1.40
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.40
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 2.1.40
    Safe / patched versions
    No safe version is published yet.
  • Plugin High Patched: Yes CVSS 7.5/10
    Contest Gallery <= 28.1.6 - Unauthenticated SQL Injection

    The Contest Gallery plugin for WordPress is vulnerable to SQL Injection via the 'form_input' parameter in versions up to, and including, 28.1.6. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query inside the unauthenticated 'post_cg_gallery_form_upload' AJAX action (specifically the 'cb' branch of the included users-upload-check.php, where $f_input_id is concatenated unquoted into 'SELECT Field_Content FROM ... WHERE id = $f_input_id'). The endpoint is gated only by a public frontend nonce ('cg1l_action' / 'cg_nonce') that is exposed in the page source of any public gallery page. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 18, 2026
    Affected Product
    Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe
    Plugin · contest-gallery
    Affected window
    Versions up to 28.1.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 28.1.7
    Recommended next step
    Update to 28.1.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 28.1.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    28.1.7
    Update to this version or a newer safe release.
    What to do

    Update to version 28.1.7, or a newer patched version

    Affected versions
    Versions up to 28.1.6
    Safe / patched versions
    28.1.7
  • Plugin High Patched: Yes CVSS 8.8/10
    AI Engine 3.4.9 - Authenticated (Subscriber+) Privilege Escalation via Missing Authorization in MCP OAuth Bearer Token

    The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, where any valid OAuth token causes MCP access to be granted without verifying administrator privileges. This makes it possible for authenticated (Subscriber+) attackers to invoke admin-level MCP tools and escalate privileges to Administrator.

    Published
    May 16, 2026
    Affected Product
    AI Engine – The Chatbot, AI Framework & MCP for WordPress
    Plugin · ai-engine
    Affected window
    3.4.9 through 3.4.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.5.0
    Recommended next step
    Update to 3.5.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    3.4.9 through 3.4.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.5.0, or a newer patched version

    Affected versions
    3.4.9 through 3.4.9
    Safe / patched versions
    3.5.0
  • Plugin Medium Patched: No CVSS 5.3/10
    Essential Chat Support <= 1.0.1 - Missing Authorization to Unauthenticated Settings Reset via 'ecs_reset_settings' Parameter

    The Essential Chat Support plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to reset all plugin configuration settings — including general settings, display rules, custom CSS, and WooCommerce tab settings — to their defaults by sending a POST request with ecs_reset_settings=1.

    Published
    May 15, 2026
    Affected Product
    Essential Chat Support
    Plugin · essential-chat-support
    Affected window
    Versions up to 1.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.0.1
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Multicollab: Content Team Collaboration and Editorial Workflow <= 5.2 - Missing Authorization to Authenticated (Subscriber+) Collaboration Comment

    The Multicollab: Content Team Collaboration and Editorial Workflow plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'cf_add_comment' function in all versions up to, and including, 5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add comments to arbitrary collaborations.

    Published
    May 15, 2026
    Affected Product
    Multicollab: Content Team Collaboration and Editorial Workflow
    Plugin · commenting-feature
    Affected window
    Versions up to 5.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.3
    Recommended next step
    Update to 5.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.3, or a newer patched version

    Affected versions
    Versions up to 5.2
    Safe / patched versions
    5.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Classified Listing <= 5.3.10 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Modification via add_order_note and send_email_to_user_by_moderator AJAX Actions

    The Classified Listing – AI-Powered Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 5.3.10. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to add arbitrary notes to any order and trigger unsolicited notification and moderation emails to listing owners without administrative authorization.

    Published
    May 14, 2026
    Affected Product
    Classified Listing – AI-Powered Classified ads & Business Directory Plugin
    Plugin · classified-listing
    Affected window
    Versions up to 5.3.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.4.0
    Recommended next step
    Update to 5.4.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.3.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.0, or a newer patched version

    Affected versions
    Versions up to 5.3.10
    Safe / patched versions
    5.4.0
  • Plugin High Patched: Yes CVSS 8.8/10
    Frontend Admin by DynamiApps <= 3.28.36 - Unauthenticated Privilege Escalation via Edit User Form

    The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 3.28.36. This is due to insufficient authorization checks in the role field update mechanism combined with overly permissive capabilities for the admin_form post type. The admin_form custom post type uses 'capability_type' => 'page', which grants editors the ability to create and edit forms. When an editor creates an edit_user form, they can manipulate the form configuration to include 'administrator' in the role_options array by directly submitting POST data to wp-admin/post.php, bypassing the UI restrictions in feadmin_get_user_roles(). When the form is subsequently submitted, the pre_update_value() function in class-role.php only validates that the submitted role exists in the form's role_options array (lines 107-110), but fails to verify that the current user has permission to assign that specific role. This makes it possible for unauthenticated attackers to first register as editors (via a public new_user form), then create an edit_user form with administrator in the allowed roles, and finally use that form to escalate their own privileges to administrator.

    Published
    May 14, 2026
    Affected Product
    Frontend Admin by DynamiApps
    Plugin · acf-frontend-form-element
    Affected window
    Versions up to 3.28.36
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.29.1
    Recommended next step
    Update to 3.29.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.28.36
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.29.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.29.1, or a newer patched version

    Affected versions
    Versions up to 3.28.36
    Safe / patched versions
    3.29.1
  • Plugin High Patched: Yes CVSS 7.5/10
    Quick Playground <= 1.3.3 - Unauthenticated Path Traversal to Arbitrary File Read via 'stylesheet' Parameter

    The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.

    Published
    May 14, 2026
    Affected Product
    Quick Playground
    Plugin · quick-playground
    Affected window
    Versions up to 1.3.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.4
    Recommended next step
    Update to 1.3.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.4
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.4, or a newer patched version

    Affected versions
    Versions up to 1.3.3
    Safe / patched versions
    1.3.4
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Receive Notifications After Form Submitting – Form Notify for Any Forms <= 1.1.10 - Unauthenticated Authentication Bypass via LINE OAuth Callback

    The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OAuth login. When LINE doesn't provide an email address (which is common), the plugin falls back to reading the 'form_notify_line_email' cookie value without verifying that the LINE account is associated with that email address. This makes it possible for unauthenticated attackers to gain access to any user account on the site, including administrator accounts, by completing a LINE OAuth flow with their own LINE account while injecting a malicious cookie containing the target victim's email address.

    Published
    May 14, 2026
    Affected Product
    Receive Notifications After Form Submitting – Form Notify for Any Forms
    Plugin · form-notify
    Affected window
    Versions up to 1.1.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.11
    Recommended next step
    Update to 1.1.11
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.11
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.11, or a newer patched version

    Affected versions
    Versions up to 1.1.10
    Safe / patched versions
    1.1.11
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,164 indexed records 14,535 tracked plugins 1,633 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog