VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,709 results Updated continuously
  • Plugin Medium Patched: Yes CVSS 5.3/10
    King Addons for Elementor <= 51.1.49 - Unauthenticated API Keys Disclosure

    The King Addons for Elementor – 4,000+ ready Elementor sections, 650+ templates, 70+ FREE widgets for Elementor plugin for WordPress is vulnerable to unauthenticated API key disclosure in all versions up to, and including, 51.1.49 due to the plugin adding the API keys to the HTML source code via render_full_form function. This makes it possible for unauthenticated attackers to extract site's Mailchimp, Facebook and Google API keys and secrets. This vulnerability requires the Premium license to be installed

    Published
    Mar 22, 2026
    Affected Product
    King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder
    Plugin · king-addons
    Affected if you're using
    Versions up to 51.1.49
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    51.1.51
    Update to this version or a newer safe release.
    What to do

    Update to version 51.1.51, or a newer patched version

    Affected versions
    Versions up to 51.1.49
    Safe / patched versions
    51.1.51
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) <= 3.7.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via `Fancy Text Widget` And `Countdown Widget`

    The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder, Slider, Gallery, Form, Modal, Data Table Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `Fancy Text Widget` And `Countdown Widget` DOM attributes in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 22, 2026
    Affected Product
    Sina Extension for Elementor
    Plugin · sina-extension-for-elementor
    Affected if you're using
    Versions up to 3.7.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.7.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.7.1, or a newer patched version

    Affected versions
    Versions up to 3.7.0
    Safe / patched versions
    3.7.1
  • Plugin Medium Patched: Yes CVSS 5.3/10
    ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More <= 2.2.12 - Unauthenticated Sensitive Information Exposure

    The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the syncedData function. This makes it possible for unauthenticated attackers to extract sensitive data including user names, emails, phone numbers, addresses.

    Published
    Mar 22, 2026
    Affected Product
    ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
    Plugin · reviewx
    Affected if you're using
    Versions up to 2.2.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.3.0, or a newer patched version

    Affected versions
    Versions up to 2.2.12
    Safe / patched versions
    2.3.0
  • Plugin High Patched: Yes CVSS 7.3/10
    ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More <= 2.2.12 - Unauthenticated Limited Remote Code Execution

    The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to arbitrary method calls in all versions up to, and including, 2.2.12. This is due to insufficient input validation in the bulkTenReviews function that allows user-controlled data to be passed directly to a variable function call mechanism. This makes it possible for unauthenticated attackers to call arbitrary PHP class methods that take no inputs or have default values, potentially leading to information disclosure or remote code execution depending on available methods and server configuration.

    Published
    Mar 22, 2026
    Affected Product
    ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
    Plugin · reviewx
    Affected if you're using
    Versions up to 2.2.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.3.0, or a newer patched version

    Affected versions
    Versions up to 2.2.12
    Safe / patched versions
    2.3.0
  • Plugin Medium Patched: Yes CVSS 5.3/10
    ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More <= 2.2.12 - Unauthenticated Sensitive Information Exposure to Data Export

    The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the allReminderSettings function. This makes it possible for unauthenticated attackers to obtain authentication tokens and subsequently bypass admin restrictions to access and export sensitive data including order details, names, emails, addresses, phone numbers, and user information.

    Published
    Mar 22, 2026
    Affected Product
    ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
    Plugin · reviewx
    Affected if you're using
    Versions up to 2.2.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.3.0, or a newer patched version

    Affected versions
    Versions up to 2.2.12
    Safe / patched versions
    2.3.0
  • Plugin Medium Patched: Yes CVSS 6.5/10
    ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More <= 2.2.10 - Incorrect Authorization to Unauthenticated Information Exposure and Data Manipulation

    The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to unauthorized access of data due to improper authorization checks on the userAccessibility() function in all versions up to, and including, 2.2.10. This makes it possible for unauthenticated attackers to access protected REST API endpoints, extract and modify information related to users and plugin's configuration

    Published
    Mar 22, 2026
    Affected Product
    ReviewX – Multi-Criteria Reviews for WooCommerce with Google Reviews & Schema
    Plugin · reviewx
    Affected if you're using
    Versions up to 2.2.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.2.12
    Update to this version or a newer safe release.
    What to do

    Update to version 2.2.12, or a newer patched version

    Affected versions
    Versions up to 2.2.10
    Safe / patched versions
    2.2.12
  • Plugin High Patched: Yes CVSS 7.5/10
    WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters <= 4.9.1 - Unauthenticated SQL Injection via 'orderby' Parameter

    The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Mar 22, 2026
    Affected Product
    WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters
    Plugin · wp-google-map-plugin
    Affected if you're using
    Versions up to 4.9.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.9.2
    Update to this version or a newer safe release.
    What to do

    Update to version 4.9.2, or a newer patched version

    Affected versions
    Versions up to 4.9.1
    Safe / patched versions
    4.9.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Yoast SEO <= 27.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'jsonText' Block Attribute

    The Yoast SEO – Advanced SEO with real-time guidance and built-in AI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the `jsonText` block attribute in all versions up to, and including, 27.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 21, 2026
    Affected Product
    Yoast SEO – Advanced SEO with real-time guidance and built-in AI
    Plugin · wordpress-seo
    Affected if you're using
    Versions up to 27.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    27.2
    Update to this version or a newer safe release.
    What to do

    Update to version 27.2, or a newer patched version

    Affected versions
    Versions up to 27.1.1
    Safe / patched versions
    27.2
  • Plugin High Patched: Yes CVSS 8.8/10
    The Ultimate WordPress Toolkit – WP Extended <= 3.2.4 - Authenticated (Subscriber+) Privilege Escalation via Menu Editor Module

    The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` method, which is hooked into the `user_has_cap` filter, grants elevated capabilities including `manage_options` when this check returns true. This makes it possible for authenticated attackers, with Subscriber-level access and above, to gain administrative capabilities by appending a crafted query parameter to any admin URL, allowing them to update arbitrary WordPress options and ultimately create new Administrator accounts.

    Published
    Mar 21, 2026
    Affected Product
    The Ultimate WordPress Toolkit – WP Extended
    Plugin · wpextended
    Affected if you're using
    Versions up to 3.2.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.2.5
    Update to this version or a newer safe release.
    What to do

    Update to version 3.2.5, or a newer patched version

    Affected versions
    Versions up to 3.2.4
    Safe / patched versions
    3.2.5
  • Plugin High Patched: Yes CVSS 8.1/10
    Import and export users and customers <= 1.29.7 - Privilege Escalation to Administrator via save_extra_user_profile_fields

    The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes it possible for unauthenticated attackers to escalate their privileges to Administrator by submitting a crafted registration request that sets the 'wp_capabilities' meta key. The vulnerability can only be exploited if the "Show fields in profile" setting is enabled and a CSV with a wp_capabilities column header has been previously imported.

    Published
    Mar 21, 2026
    Affected Product
    Import and export users and customers
    Plugin · import-users-from-csv-with-meta
    Affected if you're using
    Versions up to 1.29.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0, or a newer patched version

    Affected versions
    Versions up to 1.29.7
    Safe / patched versions
    2.0
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,709 indexed records 14,271 tracked plugins 1,481 tracked themes