VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,471 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: No CVSS 4.4/10
    VideoZen <= 1.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'VideoZen available subtitles languages' Field

    The VideoZen plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.0.1. This is due to insufficient input sanitization and output escaping in the videozen_conf() function. The 'lang' POST parameter is stored directly via update_option() without any sanitization, and later echoed inside a element without applying esc_textarea() or any equivalent escaping function. This makes it possible for authenticated attackers with Administrator-level access and above to inject arbitrary web scripts into the plugin settings page that will execute whenever any user accesses that page.

    Published
    Apr 16, 2026
    Affected Product
    VideoZen
    Plugin · videozen
    Affected window
    Versions up to 1.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.0.1
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: No CVSS 4.3/10
    CMS für Motorrad Werkstätten <= 1.0.0 - Cross-Site Request Forgery

    The cms-fuer-motorrad-werkstaetten plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to and including 1.0.0. This is due to missing nonce validation on all eight AJAX deletion handlers: vehicles_cfmw_d_vehicle, contacts_cfmw_d_contact, suppliers_cfmw_d_supplier, receipts_cfmw_d_receipt, positions_cfmw_d_position, catalogs_cfmw_d_article, stock_cfmw_d_item, and settings_cfmw_d_catalog. None of these handlers call check_ajax_referer() or wp_verify_nonce(), nor do they perform any capability checks via current_user_can(). This makes it possible for unauthenticated attackers to delete arbitrary vehicles, contacts, suppliers, receipts, positions, catalog articles, stock items, or entire supplier catalogs via a forged request, provided they can trick a logged-in user into performing an action such as clicking a link to a malicious page.

    Published
    Apr 16, 2026
    Affected Product
    Plugin: CMS für Motorrad Werkstätten
    Plugin · cms-fuer-motorrad-werkstaetten
    Affected window
    Versions up to 1.0.0
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 1.0.0
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: No CVSS 4.3/10
    Canto <= 3.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Setting Modification

    The Canto plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 3.1.1. This is due to the absence of any capability check or nonce verification in the updateOptions() function, which is exposed via two AJAX hooks: wp_ajax_updateOptions (class-canto.php line 231) and wp_ajax_fbc_updateOptions (class-canto-settings.php line 76). Both hooks are registered exclusively under the wp_ajax_ prefix (requiring only a logged-in user), with no call to current_user_can() or check_ajax_referer(). This makes it possible for authenticated attackers with subscriber-level access and above to arbitrarily modify or delete plugin options controlling cron scheduling behavior (fbc_duplicates, fbc_cron, fbc_schedule, fbc_cron_time_day, fbc_cron_time_hour, fbc_cron_start) and to manipulate or clear the plugin's scheduled WordPress cron event (fbc_scheduled_update).

    Published
    Apr 16, 2026
    Affected Product
    Canto
    Plugin · canto
    Affected window
    Versions up to 3.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 3.1.1
    Safe / patched versions
    No safe version is published yet.
  • Plugin High Patched: Yes CVSS 7.5/10
    Unlimited Elements For Elementor <= 2.0.6 - Authenticated (Contributor+) Arbitrary File Read via Path Traversal in Repeater JSON/CSV URL with Path Traversal

    The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simple string replacement to remove the site's base URL without sanitizing path traversal sequences (../), and the cleanPath() function only normalizes directory separators without removing traversal components. This allows an attacker to provide a URL like http://site.com/../../../../etc/passwd which, after URLtoRelative() strips the domain, results in /../../../../etc/passwd being concatenated with the base path and ultimately resolved to /etc/passwd. This makes it possible for authenticated attackers with Author-level access and above to read arbitrary local files from the WordPress host, including sensitive files such as wp-config.

    Published
    Apr 16, 2026
    Affected Product
    Unlimited Elements For Elementor
    Plugin · unlimited-elements-for-elementor
    Affected window
    Versions up to 2.0.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.7
    Recommended next step
    Update to 2.0.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.7
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.7, or a newer patched version

    Affected versions
    Versions up to 2.0.6
    Safe / patched versions
    2.0.7
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Quiz and Survey Master (QSM) <= 11.1.0 - Unauthenticated Shortcode Injection Leading to Arbitrary Quiz Result Disclosure via Quiz Answer Text Input Fields

    The Quiz And Survey Master plugin for WordPress is vulnerable to Arbitrary Shortcode Execution in versions up to and including 11.1.0. This is due to insufficient input sanitization and the execution of do_shortcode() on user-submitted quiz answer text. User-submitted answers pass through sanitize_text_field() and htmlspecialchars(), which only strip HTML tags but do not encode or remove shortcode brackets [ and ]. When quiz results are displayed, the plugin calls do_shortcode() on the entire results page output (including user answers), causing any injected shortcodes to be executed. This makes it possible for unauthenticated attackers to inject arbitrary WordPress shortcodes such as [qsm_result id=X] to access other users' quiz submissions without authorization, as the qsm_result shortcode lacks any authorization checks.

    Published
    Apr 16, 2026
    Affected Product
    Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
    Plugin · quiz-master-next
    Affected window
    Versions up to 10.1.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 11.1.1
    Recommended next step
    Update to 11.1.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 10.1.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    11.1.1
    Update to this version or a newer safe release.
    What to do

    Update to version 11.1.1, or a newer patched version

    Affected versions
    Versions up to 10.1.0
    Safe / patched versions
    11.1.1
  • Plugin Medium Patched: Yes CVSS 4.9/10
    JetBackup <= 3.1.19.8 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal in 'fileName' Parameter

    The JetBackup – Backup, Restore & Migrate plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary Directory Deletion in versions up to and including 3.1.19.8. This is due to insufficient input validation on the fileName parameter in the file upload handler. The plugin sanitizes the fileName parameter using sanitize_text_field(), which removes HTML tags but does not prevent path traversal sequences like '../'. The unsanitized filename is then directly concatenated in Upload::getFileLocation() without using basename() or validating the resolved path stays within the intended directory. When an invalid file is uploaded, the cleanup logic calls dirname() on the traversed path and passes it to Util::rm(), which recursively deletes the entire resolved directory. This makes it possible for authenticated attackers with administrator-level access to traverse outside the intended upload directory and trigger deletion of critical WordPress directories such as wp-content/plugins, effectively disabling all installed plugins and causing severe site disruption.

    Published
    Apr 16, 2026
    Affected Product
    JetBackup – Backup, Restore & Migrate
    Plugin · backup
    Affected window
    Versions up to 3.1.19.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.20.3
    Recommended next step
    Update to 3.1.20.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.19.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.20.3
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.20.3, or a newer patched version

    Affected versions
    Versions up to 3.1.19.8
    Safe / patched versions
    3.1.20.3
  • Plugin Medium Patched: Yes CVSS 5.3/10
    LatePoint <= 5.3.2 - Insecure Direct Object Reference to Unauthenticated Sensitive Financial Data Exposure via Sequential Invoice ID

    The LatePoint plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.3.2. The vulnerability exists because the OsStripeConnectController::create_payment_intent_for_transaction action is registered as a public action (no authentication required) and loads invoices by sequential integer invoice_id without any access_key or ownership verification. This is in contrast to other invoice-related actions (view_by_key, payment_form, summary_before_payment) in OsInvoicesController which properly require a cryptographic UUID access_key. This makes it possible for unauthenticated attackers to enumerate valid invoice IDs via an error message oracle, create unauthorized transaction intent records in the database containing sensitive financial data (invoice_id, order_id, customer_id, charge_amount), and on sites with Stripe Connect configured, the response also leaks Stripe payment_intent_client_secret tokens, transaction_intent_key values, and payment amounts for any invoice.

    Published
    Apr 16, 2026
    Affected Product
    LatePoint – Calendar Booking Plugin for Appointments and Events
    Plugin · latepoint
    Affected window
    Versions up to 5.3.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.4.0
    Recommended next step
    Update to 5.4.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.3.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.0, or a newer patched version

    Affected versions
    Versions up to 5.3.2
    Safe / patched versions
    5.4.0
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Tutor LMS <= 3.9.8 - Authenticated (Admin+) SQL Injection via 'date' Parameter

    The Tutor LMS plugin for WordPress is vulnerable to SQL Injection in versions up to and including 3.9.8. This is due to insufficient escaping on the 'date' parameter combined with direct interpolation into a SQL fragment before being passed to $wpdb->prepare(). This makes it possible for authenticated attackers with Admin-level access and above to append additional SQL queries and extract sensitive information from the database.

    Published
    Apr 16, 2026
    Affected Product
    Tutor LMS – eLearning and online course solution
    Plugin · tutor
    Affected window
    Versions up to 3.9.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.9
    Recommended next step
    Update to 3.9.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.9
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.9, or a newer patched version

    Affected versions
    Versions up to 3.9.8
    Safe / patched versions
    3.9.9
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Tutor LMS <= 3.9.8 - Authenticated (Subscriber+) Arbitrary Course Content Manipulation via tutor_update_course_content_order

    The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course content manipulation in versions up to and including 3.9.8. This is due to a missing authorization check in the tutor_update_course_content_order() function. The function only validates the nonce (CSRF protection) but does not verify whether the user has permission to manage course content. The can_user_manage() authorization check only executes when the 'content_parent' parameter is present in the request. When this parameter is omitted, the function proceeds directly to save_course_content_order() which manipulates the wp_posts table without any authorization validation. This makes it possible for authenticated attackers with subscriber-level access and above to detach all lessons from any topic, move lessons between topics, and modify the menu_order of course content, effectively allowing them to disrupt the structure of any course on the site.

    Published
    Apr 16, 2026
    Affected Product
    Tutor LMS – eLearning and online course solution
    Plugin · tutor
    Affected window
    Versions up to 3.9.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.9
    Recommended next step
    Update to 3.9.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.9.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.9
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.9, or a newer patched version

    Affected versions
    Versions up to 3.9.8
    Safe / patched versions
    3.9.9
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Kubio AI Page Builder <= 2.7.2 - Missing Authorization to Authenticated (Contributor+) Limited File Upload via Kubio Block Attributes

    The Kubio plugin for WordPress is vulnerable to Arbitrary File Upload in versions up to and including 2.7.2. This is due to insufficient capability checks in the kubio_rest_pre_insert_import_assets() function, which is hooked to the rest_pre_insert_{post_type} filter for posts, pages, templates, and template parts. When a post is created or updated via the REST API, Kubio parses block attributes looking for URLs in the 'kubio' attribute namespace and automatically imports them via importRemoteFile() without verifying the user has the upload_files capability. This makes it possible for authenticated attackers with Contributor-level access and above to bypass WordPress's normal media upload restrictions and upload files fetched from external URLs to the media library, creating attachment posts in the database.

    Published
    Apr 16, 2026
    Affected Product
    Kubio AI Page Builder
    Plugin · kubio
    Affected window
    Versions up to 2.7.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.7.3
    Recommended next step
    Update to 2.7.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.7.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.7.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.7.3, or a newer patched version

    Affected versions
    Versions up to 2.7.2
    Safe / patched versions
    2.7.3
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,471 indexed records 14,405 tracked plugins 1,568 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog