VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,713 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Critical Patched: Yes CVSS 9.8/10
    Temporary Login <= 1.0.0 - Authentication Bypass to Account Takeover

    The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.

    Published
    Apr 30, 2026
    Affected Product
    Temporary Login
    Plugin · temporary-login
    Affected window
    Versions up to 1.0.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.0
    Recommended next step
    Update to 1.1.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.0, or a newer patched version

    Affected versions
    Versions up to 1.0.0
    Safe / patched versions
    1.1.0
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Freemius <= 2.10.1 - Reflected DOM-Based Cross-Site Scripting via url Parameter

    Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Apr 30, 2026
    Affected Product
    YASR – Yet Another Star Rating Plugin for WordPress
    Plugin · yet-another-stars-rating
    Affected window
    Versions up to 3.4.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.15
    Recommended next step
    Update to 3.4.15
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.4.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.15
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.15, or a newer patched version

    Affected versions
    Versions up to 3.4.12
    Safe / patched versions
    3.4.15
  • Plugin High Patched: Yes CVSS 8.8/10
    WP Editor <= 1.2.9.2 - Cross-Site Request Forgery to Remote Code Execution via Plugin and Theme File Editor

    The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possible for unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with attacker-controlled code via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.

    Published
    Apr 30, 2026
    Affected Product
    WP Editor
    Plugin · wp-editor
    Affected window
    Versions up to 1.2.9.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.9.3
    Recommended next step
    Update to 1.2.9.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.9.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.9.3
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.9.3, or a newer patched version

    Affected versions
    Versions up to 1.2.9.2
    Safe / patched versions
    1.2.9.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Elementor Website Builder <= 4.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via REST API

    The Elementor Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _elementor_data meta field in versions up to, and including, 4.0.4. This is due to insufficient input sanitization when processing form-encoded REST API requests. The plugin registers the _elementor_data meta field with show_in_rest but omits a sanitize_callback, relying instead on a rest_pre_insert_post filter (sanitize_post_data function) that only sanitizes JSON-encoded request bodies. When a contributor sends a form-encoded PATCH request to the WordPress REST API, the json_decode() call on the raw body returns null, causing all sanitization to be skipped. The unsanitized data is then stored via update_post_meta() and later output without escaping through multiple widget sinks including the HTML widget's print_unescaped_setting() function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 30, 2026
    Affected Product
    Elementor Website Builder – more than just a page builder
    Plugin · elementor
    Affected window
    Versions up to 4.0.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.0.5
    Recommended next step
    Update to 4.0.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.0.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.0.5
    Update to this version or a newer safe release.
    What to do

    Update to version 4.0.5, or a newer patched version

    Affected versions
    Versions up to 4.0.4
    Safe / patched versions
    4.0.5
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Ultimate Dashboard <= 3.8.14 - Cross-Site Request Forgery to Module Activation/Deactivation

    The Ultimate Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.14. This is due to a flawed nonce validation conditional in the 'handle_module_actions' function. This makes it possible for unauthenticated attackers to toggle plugin modules on or off via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Apr 30, 2026
    Affected Product
    Ultimate Dashboard – Custom WordPress Dashboard
    Plugin · ultimate-dashboard
    Affected window
    Versions up to 3.8.14
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.8.15
    Recommended next step
    Update to 3.8.15
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.8.14
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.8.15
    Update to this version or a newer safe release.
    What to do

    Update to version 3.8.15, or a newer patched version

    Affected versions
    Versions up to 3.8.14
    Safe / patched versions
    3.8.15
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Five Star Restaurant Reservations <= 2.7.16 - Unauthenticated Payment Bypass via PHP Type Juggling in 'payment_id' Parameter

    The Five Star Restaurant Reservations plugin for WordPress is vulnerable to a payment bypass via PHP type juggling in versions up to, and including, 2.7.16 This is due to the valid_payment() function using a PHP loose comparison (==) between the attacker-controlled payment_id POST parameter and the booking's stripe_payment_intent_id property. When an unauthenticated attacker submits a request to the nopriv AJAX handler rtb_stripe_pmt_succeed before the Stripe payment intent has been created for a booking (i.e., before the JavaScript-triggered create_stripe_pmtIntnt() call has stored an intent ID in post meta), the stripe_payment_intent_id property on the booking object remains null. The comparison sanitize_text_field('') == null evaluates to TRUE in PHP loose comparison, causing the payment verification check to pass with zero actual payment. This makes it possible for unauthenticated attackers to mark any existing payment_pending booking as paid without completing a Stripe payment by submitting an empty payment_id parameter.

    Published
    Apr 29, 2026
    Affected Product
    Five Star Restaurant Reservations – WordPress Booking Plugin
    Plugin · restaurant-reservations
    Affected window
    Versions up to 2.7.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.7.17
    Recommended next step
    Update to 2.7.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.7.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.7.17
    Update to this version or a newer safe release.
    What to do

    Update to version 2.7.17, or a newer patched version

    Affected versions
    Versions up to 2.7.16
    Safe / patched versions
    2.7.17
  • Plugin High Patched: Yes CVSS 7.5/10
    Otter Blocks <= 3.1.4 - Improper Authorization to Unauthenticated Purchase Verification Bypass via Forged Cookie

    The Otter Blocks plugin for WordPress is vulnerable to Purchase Verification Bypass in all versions up to, and including, 3.1.4. This is due to the 'get_customer_data' method relying on an unsigned 'o_stripe_data' cookie to determine Stripe product ownership for unauthenticated users. The 'check_purchase' method trusts this cookie data without performing server-side verification against the Stripe API for one-time 'payment' mode purchases. This makes it possible for unauthenticated attackers to bypass Stripe purchase-gated content visibility conditions by forging the 'o_stripe_data' cookie with a target product ID, which is publicly exposed in the checkout block's HTML source.

    Published
    Apr 29, 2026
    Affected Product
    Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE
    Plugin · otter-blocks
    Affected window
    Versions up to 3.1.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.5
    Recommended next step
    Update to 3.1.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.5, or a newer patched version

    Affected versions
    Versions up to 3.1.4
    Safe / patched versions
    3.1.5
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Complianz – GDPR/CCPA Cookie Consent <= 7.4.5 - Missing Authorization to Unauthenticated Private Post Content Disclosure via Consent Area REST Endpoint

    The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to unauthorized data access in all versions up to, and including, 7.4.5 This is due to the REST API endpoint at /wp-json/complianz/v1/consent-area/{post_id}/{block_id} using __return_true as the permission_callback, allowing any unauthenticated user to access it. The cmplz_rest_consented_content() function retrieves a post by ID via get_post() and returns the consentedContent attribute of any complianz/consent-area block found in it, without checking if the post is published or if the user has permission to read it. This makes it possible for unauthenticated attackers to read the consent area block content from private, draft, or unpublished posts.

    Published
    Apr 28, 2026
    Affected Product
    Complianz – GDPR/CCPA Cookie Consent
    Plugin · complianz-gdpr
    Affected window
    Versions up to 7.4.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 7.4.6
    Recommended next step
    Update to 7.4.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.4.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.4.6
    Update to this version or a newer safe release.
    What to do

    Update to version 7.4.6, or a newer patched version

    Affected versions
    Versions up to 7.4.5
    Safe / patched versions
    7.4.6
  • Plugin Medium Patched: Yes CVSS 6.1/10
    WP Meteor Website Speed Optimization Addon <= 3.4.16 - Unauthenticated Stored Cross-Site Scripting via Comment

    The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'frontend_rewrite' function's 'WPMETEOR[N]WPMETEOR' placeholder content in all versions up to, and including, 3.4.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 28, 2026
    Affected Product
    WP Meteor Website Speed Optimization Addon
    Plugin · wp-meteor
    Affected window
    Versions up to 3.4.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.17
    Recommended next step
    Update to 3.4.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.4.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.17
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.17, or a newer patched version

    Affected versions
    Versions up to 3.4.16
    Safe / patched versions
    3.4.17
  • Plugin High Patched: Yes CVSS 7.2/10
    Check & Log Email – Easy Email Testing & Mail logging < 2.0.13 - Unauthenticated Stored Cross-Site Scripting

    The Check & Log Email – Easy Email Testing & Mail logging plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to 2.0.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 28, 2026
    Affected Product
    Check & Log Email – Easy Email Testing & Mail logging
    Plugin · check-email
    Affected window
    Versions before 2.0.13
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.13
    Recommended next step
    Update to 2.0.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions before 2.0.13
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.13
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.13, or a newer patched version

    Affected versions
    Versions before 2.0.13
    Safe / patched versions
    2.0.13
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,713 indexed records 14,455 tracked plugins 1,595 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog