VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,608 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 5.3/10
    Five Star Restaurant Reservations <= 2.7.16 - Unauthenticated Payment Bypass via PHP Type Juggling in 'payment_id' Parameter

    The Five Star Restaurant Reservations plugin for WordPress is vulnerable to a payment bypass via PHP type juggling in versions up to, and including, 2.7.16 This is due to the valid_payment() function using a PHP loose comparison (==) between the attacker-controlled payment_id POST parameter and the booking's stripe_payment_intent_id property. When an unauthenticated attacker submits a request to the nopriv AJAX handler rtb_stripe_pmt_succeed before the Stripe payment intent has been created for a booking (i.e., before the JavaScript-triggered create_stripe_pmtIntnt() call has stored an intent ID in post meta), the stripe_payment_intent_id property on the booking object remains null. The comparison sanitize_text_field('') == null evaluates to TRUE in PHP loose comparison, causing the payment verification check to pass with zero actual payment. This makes it possible for unauthenticated attackers to mark any existing payment_pending booking as paid without completing a Stripe payment by submitting an empty payment_id parameter.

    Published
    Apr 29, 2026
    Affected Product
    Five Star Restaurant Reservations – WordPress Booking Plugin
    Plugin · restaurant-reservations
    Affected window
    Versions up to 2.7.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.7.17
    Recommended next step
    Update to 2.7.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.7.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.7.17
    Update to this version or a newer safe release.
    What to do

    Update to version 2.7.17, or a newer patched version

    Affected versions
    Versions up to 2.7.16
    Safe / patched versions
    2.7.17
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Complianz – GDPR/CCPA Cookie Consent <= 7.4.5 - Missing Authorization to Unauthenticated Private Post Content Disclosure via Consent Area REST Endpoint

    The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to unauthorized data access in all versions up to, and including, 7.4.5 This is due to the REST API endpoint at /wp-json/complianz/v1/consent-area/{post_id}/{block_id} using __return_true as the permission_callback, allowing any unauthenticated user to access it. The cmplz_rest_consented_content() function retrieves a post by ID via get_post() and returns the consentedContent attribute of any complianz/consent-area block found in it, without checking if the post is published or if the user has permission to read it. This makes it possible for unauthenticated attackers to read the consent area block content from private, draft, or unpublished posts.

    Published
    Apr 28, 2026
    Affected Product
    Complianz – GDPR/CCPA Cookie Consent
    Plugin · complianz-gdpr
    Affected window
    Versions up to 7.4.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 7.4.6
    Recommended next step
    Update to 7.4.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.4.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.4.6
    Update to this version or a newer safe release.
    What to do

    Update to version 7.4.6, or a newer patched version

    Affected versions
    Versions up to 7.4.5
    Safe / patched versions
    7.4.6
  • Plugin Medium Patched: Yes CVSS 6.1/10
    WP Meteor Website Speed Optimization Addon <= 3.4.16 - Unauthenticated Stored Cross-Site Scripting via Comment

    The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'frontend_rewrite' function's 'WPMETEOR[N]WPMETEOR' placeholder content in all versions up to, and including, 3.4.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 28, 2026
    Affected Product
    WP Meteor Website Speed Optimization Addon
    Plugin · wp-meteor
    Affected window
    Versions up to 3.4.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.17
    Recommended next step
    Update to 3.4.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.4.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.17
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.17, or a newer patched version

    Affected versions
    Versions up to 3.4.16
    Safe / patched versions
    3.4.17
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Booking Package <= 1.7.06 - Unauthenticated Price Manipulation via 'amount' Parameter

    The Booking Package plugin for WordPress is vulnerable to Price Manipulation in versions up to, and including, 1.7.06 This is due to the intentForStripe() function passing user-controlled $_POST['amount'] directly to the Stripe PaymentIntent API without validation, and the commitStripe() function ignoring the server-calculated amount when confirming the payment. While the server correctly calculates the booking cost via getAmount() based on services, guests, taxes, and coupons, this calculated amount is never validated against or used to update the PaymentIntent because the critical code in CreditCard.php that would include the calculated amount in the PaymentIntent update is commented out. This makes it possible for unauthenticated attackers to book services at arbitrary prices (e.g., $0.01 instead of $500.00) by manipulating the amount parameter during PaymentIntent creation and completing the booking with the fraudulent payment.

    Published
    Apr 27, 2026
    Affected Product
    Booking Package
    Plugin · booking-package
    Affected window
    Versions up to 1.7.06
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.7.07
    Recommended next step
    Update to 1.7.07
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.06
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.7.07
    Update to this version or a newer safe release.
    What to do

    Update to version 1.7.07, or a newer patched version

    Affected versions
    Versions up to 1.7.06
    Safe / patched versions
    1.7.07
  • Theme Medium Patched: Yes CVSS 6.4/10
    Woostify <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Lity.js Library via data-lity Attribute in Custom HTML Block

    The Woostify plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.5.0 This is due to insufficient input sanitization and output escaping in the bundled Lity.js lightbox library, where user-controlled input from the href attribute is concatenated directly into a jQuery HTML string without sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Woostify
    Theme · woostify
    Affected window
    Versions up to 2.5.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.5.1
    Recommended next step
    Update to 2.5.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.5.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.5.1
    Update to this version or a newer safe release.
    What to do

    Update to version 2.5.1, or a newer patched version

    Affected versions
    Versions up to 2.5.0
    Safe / patched versions
    2.5.1
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Timeline Blocks for Gutenberg <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'titleTag' Block Attribute

    The Timeline Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'titleTag' attribute of the timeline-blocks/tb-timeline-blocks block in all versions up to, and including, 1.1.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Timeline Blocks for Gutenberg
    Plugin · timeline-blocks
    Affected window
    Versions up to 1.1.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.11
    Recommended next step
    Update to 1.1.11
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.11
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.11, or a newer patched version

    Affected versions
    Versions up to 1.1.10
    Safe / patched versions
    1.1.11
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Social Post Embed <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Threads Embed

    The Social Post Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Threads embed handler in all versions up to, and including, 2.0.1. This is due to insufficient input sanitization and output escaping on the user-supplied URL. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Social Post Embed
    Plugin · social-post-embed
    Affected window
    Versions up to 2.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.2
    Recommended next step
    Update to 2.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.2, or a newer patched version

    Affected versions
    Versions up to 2.0.1
    Safe / patched versions
    2.0.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    WPC Smart Messages for WooCommerce <= 4.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attribute

    The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'text' attribute of the `wpcsm_text_rotator` shortcode in all versions up to, and including, 4.2.8. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    WPC Smart Messages for WooCommerce
    Plugin · wpc-smart-messages
    Affected window
    Versions up to 4.2.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.9
    Recommended next step
    Update to 4.2.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.9
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.9, or a newer patched version

    Affected versions
    Versions up to 4.2.8
    Safe / patched versions
    4.2.9
  • Plugin High Patched: Yes CVSS 8.8/10
    LatePoint <= 5.4.1 - Authenticated (Agent+) Privilege Escalation to Administrator via 'connect-customer-to-wp-user' Ability

    The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the connect-customer-to-wp-user ability, which only requires the customer__edit capability granted to the latepoint_agent role by default, without verifying whether the target WordPress user ID belongs to a privileged account. This makes it possible for authenticated attackers with the latepoint_agent role to link any LatePoint customer record to an administrator's WordPress account and subsequently reset the administrator's password via the normal customer password-reset flow, resulting in full site takeover.

    Published
    Apr 27, 2026
    Affected Product
    LatePoint – Calendar Booking Plugin for Appointments and Events
    Plugin · latepoint
    Affected window
    Versions up to 5.4.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.4.2
    Recommended next step
    Update to 5.4.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.4.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.2
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.2, or a newer patched version

    Affected versions
    Versions up to 5.4.1
    Safe / patched versions
    5.4.2
  • Plugin High Patched: Yes CVSS 8.8/10
    Highland Software Custom Role Manager <= 1.0.0 - Authenticated (Subscriber+) Privilege Escalation

    The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked to the personal_options_update action accessible by any authenticated user. This makes it possible for authenticated attackers, with Subscriber-level access or higher, to potentially modify user roles via the profile update form.

    Published
    Apr 26, 2026
    Affected Product
    Highland Software Custom Role Manager
    Plugin · highland-software-custom-role-manager
    Affected window
    Versions up to 1.0.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.1
    Recommended next step
    Update to 1.0.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.1
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.1, or a newer patched version

    Affected versions
    Versions up to 1.0.0
    Safe / patched versions
    1.0.1
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,608 indexed records 14,447 tracked plugins 1,570 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog