VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,023 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.5/10
    User Registration & Membership <= 5.1.2 - Authenticated (Subscriber+) SQL Injection via membership_ids[]

    The User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder plugin for WordPress is vulnerable to SQL Injection via the ‘membership_ids[]’ parameter in all versions up to, and including, 5.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Apr 07, 2026
    Affected Product
    User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
    Plugin · user-registration
    Affected window
    Versions up to 5.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.3
    Recommended next step
    Update to 5.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.3, or a newer patched version

    Affected versions
    Versions up to 5.1.2
    Safe / patched versions
    5.1.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Beaver Builder Page Builder – Drag and Drop Website Builder <= 2.10.1.1 - Authenticated (Author+) Stored Cross-Site Scripting via 'settings[js]'

    The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'settings[js]' parameter in versions up to, and including, 2.10.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 07, 2026
    Affected Product
    Beaver Builder Page Builder – Drag and Drop Website Builder
    Plugin · beaver-builder-lite-version
    Affected window
    Versions up to 2.10.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.10.1.2
    Recommended next step
    Update to 2.10.1.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.10.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.10.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.10.1.2, or a newer patched version

    Affected versions
    Versions up to 2.10.1.1
    Safe / patched versions
    2.10.1.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    PrivateContent Free <= 1.2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'align' Shortcode Attribute

    The PrivateContent Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' shortcode attribute in the [pc-login-form] shortcode in all versions up to, and including, 1.2.0. This is due to insufficient input sanitization and output escaping on the 'align' attribute. Specifically, the attribute value flows from the shortcode through pc_login_form() to pc_static::form_align(), where it is directly concatenated into an HTML class attribute without esc_attr() or any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 07, 2026
    Affected Product
    PrivateContent Free
    Plugin · privatecontent-free
    Affected window
    Versions up to 1.2.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.0
    Recommended next step
    Update to 1.3.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.0, or a newer patched version

    Affected versions
    Versions up to 1.2.0
    Safe / patched versions
    1.3.0
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Robo Gallery <= 5.1.3 - Authenticated (Author+) Stored Cross-Site Scripting via 'Loading Label' Setting

    The Robo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Loading Label' setting in all versions up to, and including, 5.1.3. The plugin uses a custom `|***...***|` marker pattern in its `fixJsFunction()` method to embed raw JavaScript function references within JSON-encoded configuration objects. When a gallery's options are rendered on the frontend, `json_encode()` wraps all string values in double quotes. The `fixJsFunction()` method then strips the `"|***` and `***|"` sequences, effectively converting a JSON string value into raw JavaScript code. The Loading Label field (stored as `rbs_gallery_LoadingWord` post_meta) is an `rbstext` type field that is sanitized with `sanitize_text_field()` on save. While this strips HTML tags, it does not strip the `|***...***|` markers since they contain no HTML. When a user inputs `|***alert(document.domain)***|`, the value passes through sanitization intact, is stored in post_meta, and is later retrieved and output within an inline `` tag via `renderMainBlock()` with the quote markers stripped — resulting in arbitrary JavaScript execution. The gallery post type uses `capability_type => 'post'`, allowing Author-level users to create galleries. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page containing the gallery shortcode.

    Published
    Apr 07, 2026
    Affected Product
    Robo Gallery – Photo & Image Slider
    Plugin · robo-gallery
    Affected window
    Versions up to 5.1.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.4
    Recommended next step
    Update to 5.1.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.4
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.4, or a newer patched version

    Affected versions
    Versions up to 5.1.3
    Safe / patched versions
    5.1.4
  • Plugin Medium Patched: Yes CVSS 6.4/10
    pdfl.io <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'text' Shortcode Attribute

    The pdfl.io plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdflio' shortcode in all versions up to, and including, 1.0.5. This is due to insufficient input sanitization and output escaping on the 'text' shortcode attribute. The output_shortcode() function directly concatenates the user-supplied $text variable into HTML output without applying esc_html() or any other escaping function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 07, 2026
    Affected Product
    pdfl.io
    Plugin · pdfl-io
    Affected window
    Versions up to 1.0.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.6
    Recommended next step
    Update to 1.0.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.6
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.6, or a newer patched version

    Affected versions
    Versions up to 1.0.5
    Safe / patched versions
    1.0.6
  • Plugin Medium Patched: Yes CVSS 6.4/10
    WP Visitor Statistics (Real Time Traffic) <= 8.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'height' Shortcode Attribute

    The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wsm_showDayStatsGraph' shortcode in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 07, 2026
    Affected Product
    WP Visitor Statistics (Real Time Traffic)
    Plugin · wp-stats-manager
    Affected window
    Versions up to 8.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.5
    Recommended next step
    Update to 8.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.5
    Update to this version or a newer safe release.
    What to do

    Update to version 8.5, or a newer patched version

    Affected versions
    Versions up to 8.4
    Safe / patched versions
    8.5
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Magic Conversation For Gravity Forms <= 3.0.97 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

    The Magic Conversation For Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'magic-conversation' shortcode in all versions up to, and including, 3.0.97 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 07, 2026
    Affected Product
    Magic Conversation For Gravity Forms
    Plugin · magic-conversation-for-gravity-forms
    Affected window
    Versions up to 3.0.97
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.0.98
    Recommended next step
    Update to 3.0.98
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.0.97
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.0.98
    Update to this version or a newer safe release.
    What to do

    Update to version 3.0.98, or a newer patched version

    Affected versions
    Versions up to 3.0.97
    Safe / patched versions
    3.0.98
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Element Pack Addons for Elementor <= 8.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via SVG Image Widget

    The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG Image Widget in versions up to and including 8.4.2. This is due to insufficient input sanitization and output escaping on SVG content fetched from remote URLs in the render_svg() function. The function fetches SVG content using wp_safe_remote_get() and then directly echoes it to the page without any sanitization, only applying a preg_replace() to add attributes to the SVG tag which does not remove malicious event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript in SVG files that will execute whenever a user accesses a page containing the malicious widget.

    Published
    Apr 07, 2026
    Affected Product
    Element Pack – Widgets, Templates & Addons for Elementor
    Plugin · bdthemes-element-pack-lite
    Affected window
    Versions up to 8.4.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.5.0
    Recommended next step
    Update to 8.5.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.4.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 8.5.0, or a newer patched version

    Affected versions
    Versions up to 8.4.2
    Safe / patched versions
    8.5.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Blog2Social: Social Media Auto Post & Scheduler <= 8.8.3 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Schedule Modification via 'b2s_id' Parameter

    The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts.

    Published
    Apr 07, 2026
    Affected Product
    Blog2Social: Social Media Auto Post & Scheduler
    Plugin · blog2social
    Affected window
    Versions up to 8.8.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.8.4
    Recommended next step
    Update to 8.8.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.8.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.8.4
    Update to this version or a newer safe release.
    What to do

    Update to version 8.8.4, or a newer patched version

    Affected versions
    Versions up to 8.8.3
    Safe / patched versions
    8.8.4
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Masteriyo LMS <= 2.1.7 - Unauthenticated Authorization Bypass to Arbitrary Order Completion via Stripe Webhook Endpoint

    The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content.

    Published
    Apr 07, 2026
    Affected Product
    Masteriyo LMS – Online Course Builder for eLearning, LMS & Education
    Plugin · learning-management-system
    Affected window
    Versions up to 2.1.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.8
    Recommended next step
    Update to 2.1.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.8
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.8, or a newer patched version

    Affected versions
    Versions up to 2.1.7
    Safe / patched versions
    2.1.8
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,023 indexed records 14,334 tracked plugins 1,518 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog