VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,754 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: Yes CVSS 7.2/10
    NEX-Forms <= 9.1.11 - Unauthenticated Stored Cross-Site Scripting via POST Parameter Key Names

    The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via POST parameter key names in the submit_nex_form() function in versions up to, and including, 9.1.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 02, 2026
    Affected Product
    NEX-Forms – Ultimate Forms Plugin for WordPress
    Plugin · nex-forms-express-wp-form-builder
    Affected window
    Versions up to 9.1.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 9.1.12
    Recommended next step
    Update to 9.1.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 9.1.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.1.12
    Update to this version or a newer safe release.
    What to do

    Update to version 9.1.12, or a newer patched version

    Affected versions
    Versions up to 9.1.11
    Safe / patched versions
    9.1.12
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Premium Addons for Elementor <= 4.11.70 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'custom_svg' Parameter

    The Premium Addons for Elementor – Powerful Elementor Templates & Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'custom_svg' parameter in versions up to, and including, 4.11.70 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 01, 2026
    Affected Product
    Premium Addons for Elementor – Powerful Elementor Templates & Widgets
    Plugin · premium-addons-for-elementor
    Affected window
    Versions up to 4.11.70
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.11.71
    Recommended next step
    Update to 4.11.71
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.11.70
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.11.71
    Update to this version or a newer safe release.
    What to do

    Update to version 4.11.71, or a newer patched version

    Affected versions
    Versions up to 4.11.70
    Safe / patched versions
    4.11.71
  • Plugin Medium Patched: Yes CVSS 5.8/10
    Quiz Maker by AYS <= 6.7.1.29 - Unauthenticated Stored Cross-Site Scripting via 'rate_reason'

    The Quiz Maker by AYS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rate_reason' parameter in all versions up to, and including, 6.7.1.29 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 01, 2026
    Affected Product
    Quiz Maker by AYS
    Plugin · quiz-maker
    Affected window
    Versions up to 6.7.1.29
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.7.1.30
    Recommended next step
    Update to 6.7.1.30
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.7.1.29
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.7.1.30
    Update to this version or a newer safe release.
    What to do

    Update to version 6.7.1.30, or a newer patched version

    Affected versions
    Versions up to 6.7.1.29
    Safe / patched versions
    6.7.1.30
  • Plugin High Patched: Yes CVSS 7.5/10
    Salon Booking System – Free Version <= 10.30.25 - Unauthenticated Arbitrary File Read via Booking File Field Path Traversal

    The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

    Published
    May 01, 2026
    Affected Product
    Salon Booking System – Free Version
    Plugin · salon-booking-system
    Affected window
    Versions up to 10.30.25
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 10.30.26
    Recommended next step
    Update to 10.30.26
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 10.30.25
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    10.30.26
    Update to this version or a newer safe release.
    What to do

    Update to version 10.30.26, or a newer patched version

    Affected versions
    Versions up to 10.30.25
    Safe / patched versions
    10.30.26
  • Theme Medium Patched: Yes CVSS 5.4/10
    Total <= 2.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Post Title in Blog Section Image alt Attribute

    The Total theme for WordPress is vulnerable to Stored Cross-Site Scripting via post titles in versions up to, and including, 2.2.1 due to insufficient output escaping when rendering the_title() inside HTML attribute context in the home blog section template. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Exploitation requires the malicious post to be published and displayed with a featured image in the Home Page blog section.

    Published
    May 01, 2026
    Affected Product
    Total
    Theme · total
    Affected window
    Versions up to 2.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.2.2
    Recommended next step
    Update to 2.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.2.2, or a newer patched version

    Affected versions
    Versions up to 2.2.1
    Safe / patched versions
    2.2.2
  • Plugin High Patched: Yes CVSS 7.2/10
    Brizy – Page Builder <= 2.8.11 - Unauthenticated Stored Cross-Site Scripting via FileUpload Field Value

    The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to, and including, 2.8.11 This is due to a combination of missing nonce verification for unauthenticated form submissions, insufficient handling of FileUpload fields when no file is uploaded, and the reversal of security encoding via html_entity_decode() followed by unescaped output in the admin view. The submit_form() function skips nonce verification for non-logged-in users (api.php:198). The handleFileTypeFields() function fails to overwrite user-supplied values when no file is attached. While htmlentities() is applied during storage, html_entity_decode() reverses this on display (form-entries.php:79). The form-data.php template outputs FileUpload values directly in href attributes without esc_url(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page.

    Published
    May 01, 2026
    Affected Product
    Brizy – Page Builder
    Plugin · brizy
    Affected window
    Versions up to 2.8.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.8.12
    Recommended next step
    Update to 2.8.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.8.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.8.12
    Update to this version or a newer safe release.
    What to do

    Update to version 2.8.12, or a newer patched version

    Affected versions
    Versions up to 2.8.11
    Safe / patched versions
    2.8.12
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Royal Addons for Elementor <= 1.7.1056 - Missing Authorization to Unauthenticated Form Action Meta Modification

    The Royal Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `wpr_update_form_action_meta` AJAX action in all versions up to, and including, 1.7.1056. The handler is registered on both `wp_ajax` and `wp_ajax_nopriv` hooks, making it accessible to unauthenticated users. Although a nonce is verified, the nonce (`wpr-addons-js`) is publicly exposed in frontend JavaScript via `WprConfig.nonce` on any page that loads Royal Addons widgets, rendering the protection ineffective. The endpoint also lacks any capability or ownership checks and directly calls `update_post_meta()` with user-controlled input on a whitelisted set of form action meta keys. This makes it possible for unauthenticated attackers to modify form action configuration metadata (email, submissions, Mailchimp, and webhook settings) on any post, potentially leading to webhook/email action tampering and data exfiltration via modified webhook URLs.

    Published
    May 01, 2026
    Affected Product
    Royal Addons for Elementor – Addons and Templates Kit for Elementor
    Plugin · royal-elementor-addons
    Affected window
    Versions up to 1.7.1056
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.7.1057
    Recommended next step
    Update to 1.7.1057
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.1056
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.7.1057
    Update to this version or a newer safe release.
    What to do

    Update to version 1.7.1057, or a newer patched version

    Affected versions
    Versions up to 1.7.1056
    Safe / patched versions
    1.7.1057
  • Plugin Medium Patched: Yes CVSS 5.3/10
    FundPress <= 2.0.8 - Missing Authorization to Unauthenticated Arbitrary Donation Status Modification via donate_action_status AJAX Handler

    The FundPress – WordPress Donation Plugin for WordPress is vulnerable to authorization bypass in versions up to and including 2.0.8. This is due to missing authorization and nonce verification in the donate_action_status() AJAX handler, which is registered to be accessible to unauthenticated users via wp_ajax_nopriv. The function only validates that the schema parameter equals 'donate-ajax' and that the required POST parameters are present, but fails to verify user capabilities, nonce tokens, or donation ownership. This makes it possible for unauthenticated attackers to modify the status of any donation by providing its ID (which are sequential integers and easily enumerable), allowing them to mark donations as completed, pending, cancelled, or any arbitrary status, potentially triggering email notifications and related side effects.

    Published
    May 01, 2026
    Affected Product
    FundPress – WordPress Donation Plugin
    Plugin · fundpress
    Affected window
    Versions up to 2.0.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.9
    Recommended next step
    Update to 2.0.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.9
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.9, or a newer patched version

    Affected versions
    Versions up to 2.0.8
    Safe / patched versions
    2.0.9
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Booking for Appointments and Events Calendar – Amelia <= 2.1.2 - Unauthenticated Authorization Bypass via Remote Approval Endpoint

    The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 2.1.2. This is due to a logical short-circuit flaw in authorization logic that causes token validation to be entirely skipped when a booking has a 'waiting' status. This makes it possible for unauthenticated attackers to approve any booking that is in 'waiting' status by sending a crafted request to the publicly-accessible admin-ajax endpoint.

    Published
    May 01, 2026
    Affected Product
    Booking for Appointments and Events Calendar – Amelia
    Plugin · ameliabooking
    Affected window
    Versions up to 2.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.3
    Recommended next step
    Update to 2.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.3, or a newer patched version

    Affected versions
    Versions up to 2.1.2
    Safe / patched versions
    2.3
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Geo Mashup <= 1.13.19 - Authenticated (Subscriber+) SQL Injection via 'geo_mashup_null_fields' Parameter

    The Geo Mashup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'geo_mashup_null_fields' parameter in all versions up to, and including, 1.13.19 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 01, 2026
    Affected Product
    Geo Mashup
    Plugin · geo-mashup
    Affected window
    Versions up to 1.13.19
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.13.20
    Recommended next step
    Update to 1.13.20
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.13.19
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.13.20
    Update to this version or a newer safe release.
    What to do

    Update to version 1.13.20, or a newer patched version

    Affected versions
    Versions up to 1.13.19
    Safe / patched versions
    1.13.20
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,754 indexed records 14,459 tracked plugins 1,595 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog