VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,145 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    Royal Addons for Elementor <= 1.7.1058 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'title_tag' Parameter

    The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title_tag' parameter in all versions up to, and including, 1.7.1058 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 13, 2026
    Affected Product
    Royal Addons for Elementor – Addons and Templates Kit for Elementor
    Plugin · royal-elementor-addons
    Affected window
    Versions up to 1.7.1058
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.7.1059
    Recommended next step
    Update to 1.7.1059
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.1058
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.7.1059
    Update to this version or a newer safe release.
    What to do

    Update to version 1.7.1059, or a newer patched version

    Affected versions
    Versions up to 1.7.1058
    Safe / patched versions
    1.7.1059
  • Plugin Medium Patched: Yes CVSS 5.3/10
    User Registration & Membership <= 5.1.5 - Unauthenticated Missing Authorization to Admin Approval Bypass via 'action' Parameter

    The User Registration & Membership plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 5.1.5. This is due to the is_admin_creation_process() method relying solely on the presence of action=createuser in the $_REQUEST superglobal without performing any authentication or capability check. This makes it possible for unauthenticated attackers to bypass the admin approval requirement when registering new accounts via the fallback submission path.

    Published
    May 13, 2026
    Affected Product
    User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
    Plugin · user-registration
    Affected window
    Versions up to 5.1.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.6
    Recommended next step
    Update to 5.1.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.6
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.6, or a newer patched version

    Affected versions
    Versions up to 5.1.5
    Safe / patched versions
    5.1.6
  • Plugin High Patched: Yes CVSS 7.5/10
    InfusedWoo Pro <= 5.1.2 - Unauthenticated Arbitrary File Read via 'url' Parameter

    The InfusedWoo Pro plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.1.2 via the popup_submit. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

    Published
    May 13, 2026
    Affected Product
    InfusedWoo Pro
    Plugin · infusedwooPRO
    Affected window
    Versions up to 5.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.3
    Recommended next step
    Update to 5.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.3, or a newer patched version

    Affected versions
    Versions up to 5.1.2
    Safe / patched versions
    5.1.3
  • Plugin Medium Patched: Yes CVSS 5.3/10
    MW WP Form <= 5.1.2 - Insecure Direct Object Reference to Unauthenticated Sensitive Information Disclosure via 'post_id' Query Parameter

    The MW WP Form plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 5.1.2 via the _get_post_property_from_querystring() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.

    Published
    May 13, 2026
    Affected Product
    MW WP Form
    Plugin · mw-wp-form
    Affected window
    Versions up to 5.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.3
    Recommended next step
    Update to 5.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.3, or a newer patched version

    Affected versions
    Versions up to 5.1.2
    Safe / patched versions
    5.1.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    CC Child Pages <= 2.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'more' Parameter

    The CC Child Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'more' parameter in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 13, 2026
    Affected Product
    CC Child Pages
    Plugin · cc-child-pages
    Affected window
    Versions up to 2.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.2
    Recommended next step
    Update to 2.1.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.2, or a newer patched version

    Affected versions
    Versions up to 2.1.1
    Safe / patched versions
    2.1.2
  • Plugin Critical Patched: Yes CVSS 9.1/10
    InfusedWoo Pro <= 5.1.2 - Unauthenticated Missing Authorization to Arbitrary Post Deletion via Multiple Parameters

    The InfusedWoo Pro plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 5.1.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, products, or orders, mass-delete all comments on any post, and change any post's status.

    Published
    May 13, 2026
    Affected Product
    InfusedWoo Pro
    Plugin · infusedwooPRO
    Affected window
    Versions up to 5.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.3
    Recommended next step
    Update to 5.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.3, or a newer patched version

    Affected versions
    Versions up to 5.1.2
    Safe / patched versions
    5.1.3
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Taskbuilder – Project Management & Task Management Tool With Kanban Board <= 5.0.6 - Authenticated (Subscriber+) Time-Based Blind SQL Injection via 'project_search' Parameter

    The Taskbuilder – Project Management & Task Management Tool With Kanban Board plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'project_search' parameter in all versions up to, and including, 5.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 13, 2026
    Affected Product
    Taskbuilder – Project Management & Task Management Tool With Kanban Board
    Plugin · taskbuilder
    Affected window
    Versions up to 5.0.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.0.7
    Recommended next step
    Update to 5.0.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.0.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.0.7
    Update to this version or a newer safe release.
    What to do

    Update to version 5.0.7, or a newer patched version

    Affected versions
    Versions up to 5.0.6
    Safe / patched versions
    5.0.7
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Bold Page Builder <= 5.6.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via bt_bb_button Shortcode

    The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'text' attribute of the bt_bb_button shortcode in all versions up to, and including, 5.6.8. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 13, 2026
    Affected Product
    Bold Page Builder
    Plugin · bold-page-builder
    Affected window
    Versions up to 5.6.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.6.9
    Recommended next step
    Update to 5.6.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.6.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.6.9
    Update to this version or a newer safe release.
    What to do

    Update to version 5.6.9, or a newer patched version

    Affected versions
    Versions up to 5.6.8
    Safe / patched versions
    5.6.9
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Meta Field Block <= 1.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'tagName' Block Attribute

    The Meta Field Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tagName' block attribute in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 13, 2026
    Affected Product
    Meta Field Block – Display custom fields in the Block Editor without coding
    Plugin · display-a-meta-field-as-block
    Affected window
    Versions up to 1.5.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.5.3
    Recommended next step
    Update to 1.5.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.5.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.5.3
    Update to this version or a newer safe release.
    What to do

    Update to version 1.5.3, or a newer patched version

    Affected versions
    Versions up to 1.5.2
    Safe / patched versions
    1.5.3
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Media Sync <= 1.4.9 - Authenticated (Author+) Path Traversal via 'sub_dir' and 'media_items' Parameters

    The Media Sync plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.4.9 via the 'sub_dir' and 'media_items' parameters. This is due to insufficient validation of user-supplied file paths, which are not checked for directory traversal sequences or restricted to the intended uploads directory. This makes it possible for authenticated attackers, with Author-level access and above, to perform actions on files outside of the originally intended directory.

    Published
    May 13, 2026
    Affected Product
    Media Sync
    Plugin · media-sync
    Affected window
    Versions up to 1.4.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.5.0
    Recommended next step
    Update to 1.5.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.4.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.5.0, or a newer patched version

    Affected versions
    Versions up to 1.4.9
    Safe / patched versions
    1.5.0
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,145 indexed records 14,531 tracked plugins 1,633 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog