VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,262 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: Yes CVSS 8.8/10
    Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) API Secret Key Disclosure and Privilege Escalation via 'wlm3_export_settings' AJAX Action

    The WishList Member plugin for WordPress is vulnerable to Missing Authorization leading to Sensitive Information Disclosure and Privilege Escalation in versions up to and including 3.30.1. This is due to the missing capability checks in the 'export_settings' function. This function returns the REST API Secret Key to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.

    Published
    May 22, 2026
    Affected Product
    Wishlist Member
    Plugin · wishlist-member-x
    Affected window
    Versions up to 3.30.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.31.0
    Recommended next step
    Update to 3.31.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.30.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.31.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.31.0, or a newer patched version

    Affected versions
    Versions up to 3.30.1
    Safe / patched versions
    3.31.0
  • Plugin High Patched: No CVSS 8.8/10
    Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Options Update via 'wishlistmember_team_accounts_save_settings' AJAX action

    The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember\Features\Team_Accounts::save_settings' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary plugin options, includes the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.

    Published
    May 22, 2026
    Affected Product
    Wishlist Member
    Plugin · wishlist-member-x
    Affected window
    Versions up to 3.30.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.30.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 3.30.1
    Safe / patched versions
    No safe version is published yet.
  • Plugin High Patched: Yes CVSS 8.8/10
    WishList Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) Generate API Secret Key via 'wlm3_generate_api_key' AJAX action

    The Wishlist Member plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'WishListMember3_Hooks::generate_api_key' function in all versions up to, and including, 3.30.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the REST API Secret Key, which can be used to create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.

    Published
    May 22, 2026
    Affected Product
    Wishlist Member
    Plugin · wishlist-member-x
    Affected window
    Versions up to 3.30.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.31.0
    Recommended next step
    Update to 3.31.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.30.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.31.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.31.0, or a newer patched version

    Affected versions
    Versions up to 3.30.1
    Safe / patched versions
    3.31.0
  • Plugin High Patched: Yes CVSS 8.8/10
    Wishlist Member <= 3.30.1 - Missing Authorization to Authenticated (Subscriber+) API Secret Key Disclosure and Privilege Escalation via 'wlm3_get_screen' AJAX action

    The WishList Member plugin for WordPress is vulnerable to Privilege Escalation via Missing Authorization in versions up to and including 3.30.1. This is due to the missing capability and nonce check in the ajax_get_screen() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to supply an arbitrary admin screen identifier via the data[url] parameter, causing the plugin to load and execute the administrative API configuration template without authorization. The rendered HTML, which contains the plugin's plaintext REST API Secret Key, is returned directly to the attacker in the AJAX JSON response. An attacker who obtains this key can authenticate to the WishList Member API, create a new membership level assigned the administrator WordPress role, and register an arbitrary administrator-level user account, resulting in complete site takeover.

    Published
    May 22, 2026
    Affected Product
    Wishlist Member
    Plugin · wishlist-member-x
    Affected window
    Versions up to 3.30.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.31.0
    Recommended next step
    Update to 3.31.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.30.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.31.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.31.0, or a newer patched version

    Affected versions
    Versions up to 3.30.1
    Safe / patched versions
    3.31.0
  • Plugin High Patched: Yes CVSS 8.2/10
    WooCommerce PayPal Payments <= 4.0.1 - Missing Authorization to Unauthenticated Order Manipulation and Information Disclosure

    The WooCommerce PayPal Payments plugin for WordPress is vulnerable to unauthorized order manipulation and information disclosure due to missing authorization checks on the `ppc-create-order` and `ppc-get-order` WC-AJAX endpoints in all versions up to, and including, 4.0.1. The `ppc-create-order` endpoint accepts an arbitrary WooCommerce order ID in the `pay-now` context without validating order ownership, allowing attackers to create PayPal orders for any WC order and write PayPal metadata to it. The `ppc-get-order` endpoint returns full PayPal order details for any PayPal order ID without binding to the requester's session. This makes it possible for unauthenticated attackers to chain these endpoints to manipulate other customers' order payment flows and exfiltrate sensitive order details (payer information, shipping data) by creating a PayPal order for a victim's WC order and then retrieving the PayPal order data.

    Published
    May 22, 2026
    Affected Product
    WooCommerce PayPal Payments
    Plugin · woocommerce-paypal-payments
    Affected window
    Versions up to 4.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.0.2
    Recommended next step
    Update to 4.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 4.0.2, or a newer patched version

    Affected versions
    Versions up to 4.0.1
    Safe / patched versions
    4.0.2
  • Plugin High Patched: Yes CVSS 7.5/10
    AudioIgniter Music Player <= 2.0.2 - Unauthenticated Insecure Direct Object Reference to 'audioigniter_playlist_id' Parameter

    The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playlist ID via the audioigniter_playlist_id query var or the /audioigniter/playlist/{id}/ rewrite rule and returning playlist track data without performing any authentication, capability, or post_status check — only the post_type is validated. This makes it possible for unauthenticated attackers to view track metadata (titles, artists, audio URLs, buy links, download URLs, and cover images) of any playlist on the site, including those in draft, private, pending, or trash status.

    Published
    May 21, 2026
    Affected Product
    AudioIgniter Music Player
    Plugin · audioigniter
    Affected window
    Versions up to 2.0.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.3
    Recommended next step
    Update to 2.0.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.3, or a newer patched version

    Affected versions
    Versions up to 2.0.2
    Safe / patched versions
    2.0.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Widget Context <= 1.3.3 - Cross-Site Request Forgery to Settings Update via 'wl' Parameter

    The Widget Context plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.3. This is due to missing or incorrect nonce validation on the save_widget_context_settings function. This makes it possible for unauthenticated attackers to modify widget visibility context settings stored in the WordPress options table via a forged POST request to /wp-admin/widgets.php via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    May 21, 2026
    Affected Product
    Widget Context
    Plugin · widget-context
    Affected window
    Versions up to 1.3.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.4.0
    Recommended next step
    Update to 1.4.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.4.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.4.0, or a newer patched version

    Affected versions
    Versions up to 1.3.3
    Safe / patched versions
    1.4.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Vedrixa Forms <= 1.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Form Structure Modification via wefb_save_form_structure AJAX Action

    The Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the structure of any form — adding, removing, or altering fields — by writing attacker-controlled data to the plugin's FORMS database table. The 'ajax-nonce' nonce used by this handler is injected into the public frontend via wp_localize_script(), so any authenticated user who visits a page containing a form shortcode can obtain it without any elevated access.

    Published
    May 21, 2026
    Affected Product
    Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder
    Plugin · vedrixa-forms-registration-builder
    Affected window
    Versions up to 1.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.0
    Recommended next step
    Update to 1.2.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.0, or a newer patched version

    Affected versions
    Versions up to 1.1.1
    Safe / patched versions
    1.2.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Slider by Soliloquy <= 2.8.1 - Authenticated (Subscriber+) Information Disclosure via REST API Endpoint

    The Slider by Soliloquy – Responsive Image Slider for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.1 via the map_meta_cap. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract draft slider metadata including unpublished media URLs, captions, and slider configuration authored by administrators or editors.

    Published
    May 21, 2026
    Affected Product
    Slider by Soliloquy – Responsive Image Slider for WordPress
    Plugin · soliloquy-lite
    Affected window
    Versions up to 2.8.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.8.2
    Recommended next step
    Update to 2.8.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.8.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.8.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.8.2, or a newer patched version

    Affected versions
    Versions up to 2.8.1
    Safe / patched versions
    2.8.2
  • Plugin Medium Patched: Yes CVSS 5.3/10
    MotoPress Hotel Booking <= 6.0.1 - Missing Authorization to Unauthenticated Arbitrary Booking Notes Modification via mphb_update_booking_notes AJAX Action

    The MotoPress Hotel Booking plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 6.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite or delete the internal notes (_mphb_booking_internal_notes) of any booking by supplying an arbitrary booking ID. The nonce for this action is output in the HTML source of every public page through wp_localize_script (MPHB._data.nonces), so any unauthenticated visitor can obtain a valid nonce and perform the action without any account or prior interaction.

    Published
    May 21, 2026
    Affected Product
    MotoPress Hotel Booking
    Plugin · motopress-hotel-booking-lite
    Affected window
    Versions up to 6.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.0.2
    Recommended next step
    Update to 6.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 6.0.2, or a newer patched version

    Affected versions
    Versions up to 6.0.1
    Safe / patched versions
    6.0.2
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,262 indexed records 14,568 tracked plugins 1,634 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog