VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,062 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin High Patched: Yes CVSS 7.1/10
    Gravity SMTP <= 2.1.4 - Missing Authorization to Authenticated (Subscriber+) Plugin Uninstall

    The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and delete plugin options. NOTE: This vulnerability is also exploitable via a Cross-Site Request Forgery vector.

    Published
    Apr 09, 2026
    Affected Product
    Gravity SMTP
    Plugin · gravitysmtp
    Affected window
    Versions up to 2.1.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.5
    Recommended next step
    Update to 2.1.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.5, or a newer patched version

    Affected versions
    Versions up to 2.1.4
    Safe / patched versions
    2.1.5
  • Plugin Medium Patched: Yes CVSS 6.4/10
    AddFunc Head & Footer Code <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Fields

    The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `aFhfc_head_code`, `aFhfc_body_code`, and `aFhfc_footer_code` post meta values in all versions up to, and including, 2.3. This is due to the plugin outputting these meta values without any sanitization or escaping. While the plugin restricts its own metabox and save handler to administrators via `current_user_can('manage_options')`, it does not use `register_meta()` with an `auth_callback` to protect these meta keys. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via the WordPress Custom Fields interface that execute when an administrator previews or views the post.

    Published
    Apr 09, 2026
    Affected Product
    AddFunc Head & Footer Code
    Plugin · addfunc-head-footer-code
    Affected window
    Versions up to 2.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.4
    Recommended next step
    Update to 2.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.4
    Update to this version or a newer safe release.
    What to do

    Update to version 2.4, or a newer patched version

    Affected versions
    Versions up to 2.3
    Safe / patched versions
    2.4
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Aruba HiSpeed Cache <= 3.0.4 - Cross-Site Request Forgery to Plugin Settings Reset

    The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Apr 09, 2026
    Affected Product
    Aruba HiSpeed Cache
    Plugin · aruba-hispeed-cache
    Affected window
    Versions up to 3.0.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.0.5
    Recommended next step
    Update to 3.0.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.0.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.0.5
    Update to this version or a newer safe release.
    What to do

    Update to version 3.0.5, or a newer patched version

    Affected versions
    Versions up to 3.0.4
    Safe / patched versions
    3.0.5
  • Plugin Medium Patched: Yes CVSS 4.3/10
    UsersWP <= 1.2.58 - Authenticated (Subscriber+) Restricted Usermeta Modification via 'htmlvar' Parameter

    The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed fields or checked against the field's for_admin_use property. This makes it possible for authenticated attackers, with subscriber-level access and above, to clear or reset any restricted usermeta column for their own user record, including fields marked as "For admin use only", bypassing intended field-level access restrictions.

    Published
    Apr 09, 2026
    Affected Product
    UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP
    Plugin · userswp
    Affected window
    Versions up to 1.2.58
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.59
    Recommended next step
    Update to 1.2.59
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.58
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.59
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.59, or a newer patched version

    Affected versions
    Versions up to 1.2.58
    Safe / patched versions
    1.2.59
  • Plugin High Patched: Yes CVSS 7.5/10
    Tutor LMS <= 3.9.7 - Missing Authorization to Unauthenticated Arbitrary Billing Profile Overwrite via 'order_id' Parameter

    The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pay_incomplete_order()` function. The function accepts an attacker-controlled `order_id` parameter and uses it to look up order data, then writes billing fields to the order owner's profile (`$order_data->user_id`) without verifying the requester's identity or ownership. Because the Tutor nonce (`_tutor_nonce`) is exposed on public frontend pages, this makes it possible for unauthenticated attackers to overwrite the billing profile (name, email, phone, address) of any user who has an incomplete manual order, by sending a crafted POST request with a guessed or enumerated `order_id`.

    Published
    Apr 09, 2026
    Affected Product
    Tutor LMS – eLearning and online course solution
    Plugin · tutor
    Affected window
    Versions up to 3.9.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.8
    Recommended next step
    Update to 3.9.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.8
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.8, or a newer patched version

    Affected versions
    Versions up to 3.9.7
    Safe / patched versions
    3.9.8
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Webling <= 3.9.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'title' Parameter

    The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists with arbitrary web scripts that will execute whenever an administrator views the related form or memberlist area of the WordPress admin.

    Published
    Apr 09, 2026
    Affected Product
    Webling
    Plugin · webling
    Affected window
    Versions up to 3.9.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.1
    Recommended next step
    Update to 3.9.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.1, or a newer patched version

    Affected versions
    Versions up to 3.9.0
    Safe / patched versions
    3.9.1
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Customer Reviews for WooCommerce <= 5.103.0 - Unauthenticated Authentication Bypass to Arbitrary Review Submission via 'key' Parameter

    The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.103.0. This is due to the `create_review_permissions_check()` function comparing the user-supplied `key` parameter against the order's `ivole_secret_key` meta value using strict equality (`===`), without verifying that the stored key is non-empty. For orders where no review reminder email has been sent, the `ivole_secret_key` meta is not set, causing `get_meta()` to return an empty string. An attacker can supply `key: ""` to match this empty value and bypass the permission check. This makes it possible for unauthenticated attackers to submit, modify, and inject product reviews on any product — including products not associated with the referenced order — via the REST API endpoint `POST /ivole/v1/review`. Reviews are auto-approved by default since `ivole_enable_moderation` defaults to `"no"`.

    Published
    Apr 09, 2026
    Affected Product
    Customer Reviews for WooCommerce
    Plugin · customer-reviews-woocommerce
    Affected window
    Versions up to 5.103.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.104.0
    Recommended next step
    Update to 5.104.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.103.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.104.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.104.0, or a newer patched version

    Affected versions
    Versions up to 5.103.0
    Safe / patched versions
    5.104.0
  • Plugin Medium Patched: Yes CVSS 6.1/10
    Royal WordPress Backup & Restore Plugin <= 1.0.16 - Reflected Cross-Site Scripting via 'wpr_pending_template' Parameter

    The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

    Published
    Apr 09, 2026
    Affected Product
    Royal WordPress Backup, Restore & Migration Plugin – Backup WordPress Sites Safely
    Plugin · royal-backup-reset
    Affected window
    Versions up to 1.0.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.17
    Recommended next step
    Update to 1.0.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.17
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.17, or a newer patched version

    Affected versions
    Versions up to 1.0.16
    Safe / patched versions
    1.0.17
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Download Manager <= 3.3.51 - Missing Authorization to Authenticated (Contributor+) Media File Protection Removal

    The Download Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `makeMediaPublic()` and `makeMediaPrivate()` functions in all versions up to, and including, 3.3.51. This is due to the functions only checking for `edit_posts` capability without verifying post ownership via `current_user_can('edit_post', $id)`, and the destructive operations executing before the admin-level check in `mediaAccessControl()`. This makes it possible for authenticated attackers, with Contributor-level access and above, to strip all protection metadata (password, access restrictions, private flag) from any media file they do not own, making admin-protected files publicly accessible via their direct URL.

    Published
    Apr 09, 2026
    Affected Product
    Download Manager
    Plugin · download-manager
    Affected window
    Versions up to 3.3.51
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.3.52
    Recommended next step
    Update to 3.3.52
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.3.51
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.3.52
    Update to this version or a newer safe release.
    What to do

    Update to version 3.3.52, or a newer patched version

    Affected versions
    Versions up to 3.3.51
    Safe / patched versions
    3.3.52
  • Plugin High Patched: Yes CVSS 8.1/10
    Perfmatters <= 2.5.9 - Authenticated (Subscriber+) Arbitrary File Overwrite via 'snippets' Parameter

    The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` handlers without any authorization check or nonce verification. The `$_GET['snippets'][]` values are passed unsanitized to `Snippet::activate()`/`Snippet::deactivate()` which call `Snippet::update()` then `file_put_contents()` with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by corrupting critical files like `.htaccess` or `index.php`.

    Published
    Apr 09, 2026
    Affected Product
    Perfmatters
    Plugin · perfmatters
    Affected window
    Versions up to 2.5.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.6.0
    Recommended next step
    Update to 2.6.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.5.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.6.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.6.0, or a newer patched version

    Affected versions
    Versions up to 2.5.9
    Safe / patched versions
    2.6.0
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,062 indexed records 14,339 tracked plugins 1,518 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog