VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,238 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    Avada (Fusion) Builder <= 3.15.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting via Multiple Shortcodes

    The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes in all versions up to, and including, 3.15.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user (typically an administrator) accesses a page displaying dynamic user data (such as via the Dynamic Data feature pulling user biographical information).

    Published
    May 20, 2026
    Affected Product
    Avada (Fusion) Builder
    Plugin · fusion-builder
    Affected window
    Versions up to 3.15.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.15.3
    Recommended next step
    Update to 3.15.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.15.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.15.3
    Update to this version or a newer safe release.
    What to do

    Update to version 3.15.3, or a newer patched version

    Affected versions
    Versions up to 3.15.2
    Safe / patched versions
    3.15.3
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Avada (Fusion) Builder <= 3.15.2 - Unauthenticated Remote Code Execution via PHP Function Injection via 'render_logics' Shortcode Attribute via Widget AJAX Handler

    The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Conditional_Render_Helper::get_value()` passing attacker-controlled values from a base64-decoded JSON blob directly to `call_user_func()` without any allowlist validation. This is exploitable by unauthenticated attackers through the `fusion_get_widget_markup` AJAX endpoint, which is registered for non-privileged (unauthenticated) users via `wp_ajax_nopriv_fusion_get_widget_markup`. The endpoint is protected only by a nonce (`fusion_load_nonce`), but this nonce is generated for user ID 0 and is deterministically exposed in the JavaScript output of any public-facing page containing a Post Cards (`[fusion_post_cards]`) or Table of Contents (`[fusion_table_of_contents]`) element. This makes it possible for unauthenticated attackers to execute arbitrary code on affected sites.

    Published
    May 20, 2026
    Affected Product
    Avada (Fusion) Builder
    Plugin · fusion-builder
    Affected window
    Versions up to 3.15.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.15.3
    Recommended next step
    Update to 3.15.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.15.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.15.3
    Update to this version or a newer safe release.
    What to do

    Update to version 3.15.3, or a newer patched version

    Affected versions
    Versions up to 3.15.2
    Safe / patched versions
    3.15.3
  • Plugin Medium Patched: Yes CVSS 4.9/10
    WPB Floating Menu or Categories – Sticky Floating Side Menu & Categories with Icons <= 1.0.8 - Authenticated (Editor+) Stored Cross-Site Scripting via 'Icon CSS Class' Category Field

    The WPB Floating Menu & Categories for WordPress – Sticky Side Menu with Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Icon CSS Class' category field in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 20, 2026
    Affected Product
    WPB Floating Menu or Categories – Sticky Floating Side Menu & Categories with Icons
    Plugin · wpb-floating-menu-or-categories
    Affected window
    Versions up to 1.0.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.9
    Recommended next step
    Update to 1.0.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.9
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.9, or a newer patched version

    Affected versions
    Versions up to 1.0.8
    Safe / patched versions
    1.0.9
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Broadstreet <= 1.52.2 - Authenticated (Subscriber+) Private Post Meta Disclosure via get_sponsored_meta

    The Broadstreet plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.52.2 via the get_sponsored_meta AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to disclose any private post metadata.

    Published
    May 20, 2026
    Affected Product
    Broadstreet
    Plugin · broadstreet
    Affected window
    Versions up to 1.52.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.53.2
    Recommended next step
    Update to 1.53.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.52.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.53.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.53.2, or a newer patched version

    Affected versions
    Versions up to 1.52.2
    Safe / patched versions
    1.53.2
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Divi Form Builder <= 5.1.2 - Unauthenticated Privilege Escalation via 'role'

    The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without validating it against the form's configured default_user_role setting. This makes it possible for unauthenticated attackers to create administrator accounts by tampering with the role parameter during registration.

    Published
    May 20, 2026
    Affected Product
    Divi Form Builder
    Plugin · divi-form-builder
    Affected window
    Versions up to 5.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.3
    Recommended next step
    Update to 5.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.3, or a newer patched version

    Affected versions
    Versions up to 5.1.2
    Safe / patched versions
    5.1.3
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Slider Revolution <= 7.0.9 - Unauthenticated Sensitive Information Exposure via 'sliders/stream'

    The Slider Revolution plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.0.9 via the 'get_stream_data()' function. This makes it possible for unauthenticated attackers to extract sensitive data including published password-protected post, page, and product content.

    Published
    May 19, 2026
    Affected Product
    Slider Revolution
    Plugin · revslider
    Affected window
    Versions up to 7.0.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 7.0.10
    Recommended next step
    Update to 7.0.10
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.0.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.0.10
    Update to this version or a newer safe release.
    What to do

    Update to version 7.0.10, or a newer patched version

    Affected versions
    Versions up to 7.0.9
    Safe / patched versions
    7.0.10
  • Plugin High Patched: Yes CVSS 8.8/10
    AcyMailing <= 10.8.2 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation via 'acymailing_router'

    The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify privileged AcyMailing configuration, export subscriber secret keys, and chain these actions into administrator account takeover when a target administrator email address is known.

    Published
    May 19, 2026
    Affected Product
    AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress
    Plugin · acymailing
    Affected window
    Versions up to 10.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 10.9.0
    Recommended next step
    Update to 10.9.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 10.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    10.9.0
    Update to this version or a newer safe release.
    What to do

    Update to version 10.9.0, or a newer patched version

    Affected versions
    Versions up to 10.8.2
    Safe / patched versions
    10.9.0
  • Plugin Medium Patched: No CVSS 4.3/10
    Anomify AI <= 0.3.6 - Cross-Site Request Forgery

    The Anomify AI – Anomaly Detection and Alerting plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) in versions up to and including 0.3.6. This is due to missing nonce verification on the settings page handler and insufficient output escaping in the admin_options.php template. The settings form includes no wp_nonce_field() and the handler performs no check_admin_referer() check, meaning any cross-origin POST can modify plugin settings. The API key field is sanitized only with sanitize_text_field(), which strips HTML tags but does not encode double-quote characters; the value is then rendered into an HTML attribute via bare echo without esc_attr(), allowing a double-quote attribute-escape payload to survive both sanitization and storage. This makes it possible for unauthenticated attackers to inject arbitrary web scripts by tricking a logged-in administrator into visiting a malicious page that submits a forged request, storing the payload in the database and causing it to execute in the administrator's browser whenever the plugin settings page is visited.

    Published
    May 19, 2026
    Affected Product
    Anomify AI – Anomaly Detection and Alerting
    Plugin · anomify
    Affected window
    Versions up to 0.3.6
    Expand for exact coverage and remediation detail.
    Patch status
    No safe release listed
    Vendor patch has not been published in the feed yet.
    Recommended next step
    Monitor vendor release
    Reduce exposure until the vendor ships a safe release.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 0.3.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    No
    No fixed release is listed in the feed yet.
    Fixed in
    Not published
    Watch for a vendor release before treating the issue as fixed.
    What to do

    No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.

    Affected versions
    Versions up to 0.3.6
    Safe / patched versions
    No safe version is published yet.
  • Plugin Medium Patched: Yes CVSS 6.4/10
    AI Chatbot & Workflow Automation by AIWU <= 1.4.14 - Unauthenticated Stored Cross-Site Scripting via 'X-Forwarded-For' Header

    The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-Forwarded-For' header in versions up to, and including, 1.4.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: Practical exploitation is constrained due to a 20-character storage limit.

    Published
    May 19, 2026
    Affected Product
    AI Chatbot & Workflow Automation by AIWU
    Plugin · ai-copilot-content-generator
    Affected window
    Versions up to 1.4.14
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.4.15
    Recommended next step
    Update to 1.4.15
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.4.14
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.4.15
    Update to this version or a newer safe release.
    What to do

    Update to version 1.4.15, or a newer patched version

    Affected versions
    Versions up to 1.4.14
    Safe / patched versions
    1.4.15
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Photo Gallery, Sliders, Proofing and Themes <= 4.2.0 - Insecure Direct Object Reference to Authenticated (Subscriber+) Image Deletion via REST API

    The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 4.2.0. This is due to insufficient object-level authorization in the image deletion REST flow where the permission callback for DELETE /imagely/v1/images/{id} only checks 'NextGEN Manage gallery' permissions and does not enforce gallery ownership or 'NextGEN Manage others gallery' permissions. This makes it possible for authenticated attackers, with Subscriber-level privileges and 'NextGEN Manage gallery' capability, to delete gallery images belonging to other users as well as their associated image files from disk when deleteImg is enabled (default).

    Published
    May 19, 2026
    Affected Product
    Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
    Plugin · nextgen-gallery
    Affected window
    Versions up to 4.2.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.1
    Recommended next step
    Update to 4.2.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.1, or a newer patched version

    Affected versions
    Versions up to 4.2.0
    Safe / patched versions
    4.2.1
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,238 indexed records 14,560 tracked plugins 1,633 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog