VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,072 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: No CVSS 7.1/10
    wpForo Forum <= 3.0.2 - Authenticated (Subscriber+) Arbitrary File Deletion via 'data[body][fileurl]' Parameter

    The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.2. This is due to a two-step logic flaw: the topic_add() and topic_edit() action handlers accept arbitrary user-supplied data[*] arrays from $_REQUEST and store them as postmeta without restricting which fields may contain array values. Because 'body' is included in the allowed topic fields list, an attacker can supply data[body][fileurl] with an arbitrary file path (e.g., wp-config.php or an absolute server path). This poisoned fileurl is persisted to the plugin's custom postmeta database table. Subsequently, when the attacker submits wpftcf_delete[]=body on a topic_edit request, the add_file() method retrieves the stored postmeta record, extracts the attacker-controlled fileurl, passes it through wpforo_fix_upload_dir() which only rewrites legitimate wpforo upload paths and returns all other paths unchanged, and then calls wp_delete_file() on the unvalidated path. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files writable by the PHP process on the server, including critical files such as wp-config.

    Published
    Apr 10, 2026
    Affected Product
    wpForo Forum
    Plugin · wpforo
    Affected window
    Versions up to 3.0.2
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.0.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 3.0.2
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 6.5/10
    LifterLMS <= 9.2.1 - Authenticated (Custom+) SQL Injection via 'order' Parameter

    The LifterLMS plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 9.2.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Instructor-level access and above who have the edit_post capability on the quiz, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Apr 10, 2026
    Affected Product
    LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes
    Plugin · lifterlms
    Affected window
    Versions up to 9.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 9.2.2
    Recommended next step
    Update to 9.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 9.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 9.2.2, or a newer patched version

    Affected versions
    Versions up to 9.2.1
    Safe / patched versions
    9.2.2
  • Plugin Medium Patched: Yes CVSS 5.0/10
    UsersWP <= 1.2.58 - Authenticated (Subscriber+) Server-Side Request Forgery via 'uwp_crop' Parameter

    The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp_resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services.

    Published
    Apr 10, 2026
    Affected Product
    UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP
    Plugin · userswp
    Affected window
    Versions up to 1.2.58
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.59
    Recommended next step
    Update to 1.2.59
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.58
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.59
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.59, or a newer patched version

    Affected versions
    Versions up to 1.2.58
    Safe / patched versions
    1.2.59
  • Plugin High Patched: Yes CVSS 8.8/10
    BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscriber+) Privilege Escalation to Administrator via Group Blog IDOR

    The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers who create their own group) to associate their group with any blog on the Multisite network, including the main site (blog ID 1). The `default-member` parameter accepts any WordPress role, including `administrator`, without validation against a whitelist. When combined with `groupblog-silent-add`, any user who joins the attacker's group is automatically added to the targeted blog with the injected role. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate any user (including themselves via a second account) to Administrator on the main site of the Multisite network.

    Published
    Apr 10, 2026
    Affected Product
    BuddyPress Groupblog
    Plugin · bp-groupblog
    Affected window
    Versions up to 1.9.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.9.4
    Recommended next step
    Update to 1.9.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.9.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.9.4
    Update to this version or a newer safe release.
    What to do

    Update to version 1.9.4, or a newer patched version

    Affected versions
    Versions up to 1.9.3
    Safe / patched versions
    1.9.4
  • Plugin Medium Patched: Yes CVSS 6.4/10
    BlockArt Blocks <= 2.2.15 - Authenticated (Author+) Stored Cross-Site Scripting via 'clientId' Block Attribute

    The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clientId' block attribute in all versions up to, and including, 2.2.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 10, 2026
    Affected Product
    BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Template Library
    Plugin · blockart-blocks
    Affected window
    Versions up to 2.2.15
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.3.0
    Recommended next step
    Update to 2.3.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.2.15
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.3.0, or a newer patched version

    Affected versions
    Versions up to 2.2.15
    Safe / patched versions
    2.3.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Tutor LMS <= 3.9.7 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Course Content Modification

    The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authorization checks in the `save_course_content_order()` private method, which is called unconditionally by the `tutor_update_course_content_order` AJAX handler. While the handler's `content_parent` branch includes a `can_user_manage()` check, the `save_course_content_order()` call processes attacker-supplied `tutor_topics_lessons_sorting` JSON without any ownership or capability verification. This makes it possible for authenticated attackers with Subscriber-level access or above to detach lessons from topics, reorder course content, and reassign lessons between topics in any course, including admin-owned courses, by sending a crafted AJAX request with manipulated topic and lesson IDs.

    Published
    Apr 10, 2026
    Affected Product
    Tutor LMS – eLearning and online course solution
    Plugin · tutor
    Affected window
    Versions up to 3.9.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.8
    Recommended next step
    Update to 3.9.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.8
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.8, or a newer patched version

    Affected versions
    Versions up to 3.9.7
    Safe / patched versions
    3.9.8
  • Plugin High Patched: Yes CVSS 7.2/10
    Optimole <= 4.2.2 - Unauthenticated Stored Cross-Site Scripting via Srcset Descriptor Parameter

    The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.2.2. This is due to insufficient input sanitization and output escaping on the user-supplied 's' parameter (srcset descriptor) in the unauthenticated /wp-json/optimole/v1/optimizations REST endpoint. The endpoint validates requests using an HMAC signature and timestamp, but these values are exposed directly in the frontend HTML making them accessible to any visitor. The plugin uses sanitize_text_field() on the descriptor value of rest.php, which strips HTML tags but does not escape double quotes. The poisoned descriptor is then stored via transients (backed by the WordPress options table) and later retrieved and injected verbatim into the srcset attribute of tag_replacer.php without proper escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts into pages that will execute whenever a user accesses the injected page.

    Published
    Apr 10, 2026
    Affected Product
    Optimole – Optimize Images in Real Time
    Plugin · optimole-wp
    Affected window
    Versions up to 4.2.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.3
    Recommended next step
    Update to 4.2.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.3
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.3, or a newer patched version

    Affected versions
    Versions up to 4.2.2
    Safe / patched versions
    4.2.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Greenshift <= 12.8.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via disablelazy Attribute

    The GreenShift - Animation and Page Builder Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 12.8.9 This is due to insufficient input sanitization and output escaping in the gspb_greenShift_block_script_assets() function. The function uses str_replace() to insert 'fetchpriority="high"' before 'src=' attributes when processing greenshift-blocks/image blocks with the disablelazy attribute enabled. Because this replacement operates on the entire HTML string without parsing, contributors can inject the string 'src=' into HTML attribute values (such as class attributes). When the str_replace executes, the double quotes in the replacement string break out of the attribute context, allowing injection of malicious HTML attributes like onfocus with JavaScript payloads. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 10, 2026
    Affected Product
    Greenshift – animation and page builder blocks
    Plugin · greenshift-animation-and-page-builder-blocks
    Affected window
    Versions up to 12.8.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 12.9.0
    Recommended next step
    Update to 12.9.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 12.8.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    12.9.0
    Update to this version or a newer safe release.
    What to do

    Update to version 12.9.0, or a newer patched version

    Affected versions
    Versions up to 12.8.9
    Safe / patched versions
    12.9.0
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Tutor LMS <= 3.9.7 - Missing Authorization to Authenticated (Subscriber+) Unauthorized Private Course Enrollment

    The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized private course enrollment in all versions up to, and including, 3.9.7. This is due to missing post_status validation in the `enroll_now()` and `course_enrollment()` functions. Both enrollment endpoints verify the nonce, user authentication, and whether the course is purchasable, but fail to check if the course has a `private` post_status. This makes it possible for authenticated attackers with Subscriber-level access or above to enroll in private courses by sending a crafted POST request with the target course ID. The enrollment record is created in the database and the private course title and enrollment status are exposed in the subscriber's dashboard, though WordPress core access control prevents the subscriber from viewing the actual course content (returns 404). Enrollment in private courses should be restricted to users with the `read_private_posts` capability.

    Published
    Apr 10, 2026
    Affected Product
    Tutor LMS – eLearning and online course solution
    Plugin · tutor
    Affected window
    Versions up to 3.9.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.8
    Recommended next step
    Update to 3.9.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.8
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.8, or a newer patched version

    Affected versions
    Versions up to 3.9.7
    Safe / patched versions
    3.9.8
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Optimole <= 4.2.3 - Reflected Cross-Site Scripting via Page Profiler URL

    The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Apr 10, 2026
    Affected Product
    Optimole – Optimize Images in Real Time
    Plugin · optimole-wp
    Affected window
    Versions up to 4.2.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.4
    Recommended next step
    Update to 4.2.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.4
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.4, or a newer patched version

    Affected versions
    Versions up to 4.2.3
    Safe / patched versions
    4.2.4
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,072 indexed records 14,340 tracked plugins 1,518 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog