Scan WordPress with VulnTitan.
Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.
-
WP DSGVO Tools (GDPR) <= 3.1.38 - Missing Authorization to Unauthenticated Account Destruction of Non-Admin Users
The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.
PublishedMar 23, 2026Affected ProductWP DSGVO Tools (GDPR)Plugin · shapepress-dsgvoAffected if you're usingVersions up to 3.1.38Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.1.39Update to this version or a newer safe release.What to doUpdate to version 3.1.39, or a newer patched version
Affected versionsVersions up to 3.1.38Safe / patched versions3.1.39 -
JetEngine <= 3.8.6.1 - Unauthenticated SQL Injection via Listing Grid 'filtered_query' Parameter
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizing the `compare` operator before concatenating it into SQL statements. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, provided the site has a JetEngine Listing Grid with Load More enabled that uses a SQL Query Builder query.
PublishedMar 23, 2026Affected ProductJetEnginePlugin · jet-engineAffected if you're usingVersions up to 3.8.6.1Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.8.6.2Update to this version or a newer safe release.What to doUpdate to version 3.8.6.2, or a newer patched version
Affected versionsVersions up to 3.8.6.1Safe / patched versions3.8.6.2 -
Product Filter for WooCommerce by WBW <= 3.1.2 - Missing Authorization to Unauthenticated Filter Data Deletion via TRUNCATE TABLE
The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations.
PublishedMar 23, 2026Affected ProductProduct Filter for WooCommerce by WBWPlugin · woo-product-filterAffected if you're usingVersions up to 3.1.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.1.3Update to this version or a newer safe release.What to doUpdate to version 3.1.3, or a newer patched version
Affected versionsVersions up to 3.1.2Safe / patched versions3.1.3 -
LearnDash LMS <= 5.0.3 - Authenticated (Contributor+) SQL Injection via 'filters[orderby_order]' Parameter
The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
PublishedMar 23, 2026Affected ProductLearnDash LMSPlugin · sfwd-lmsAffected if you're usingVersions up to 5.0.3Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in5.0.3.1Update to this version or a newer safe release.What to doUpdate to version 5.0.3.1, or a newer patched version
Affected versionsVersions up to 5.0.3Safe / patched versions5.0.3.1 -
User Registration & Membership <= 5.1.4 - Missing Authorization to Authenticated (Contributor+) Content Access Rule Manipulation
The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Content Access Rules REST API endpoints in versions 5.0.1 through 5.1.4. This is due to the `check_permissions()` method only checking for `edit_posts` capability instead of an administrator-level capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to list, create, modify, toggle, duplicate, and delete site-wide content restriction rules, potentially exposing restricted content or denying legitimate user access.
PublishedMar 23, 2026Affected ProductUser Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login BuilderPlugin · user-registrationAffected if you're usingVersions up to 5.1.4Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in5.1.5Update to this version or a newer safe release.What to doUpdate to version 5.1.5, or a newer patched version
Affected versionsVersions up to 5.1.4Safe / patched versions5.1.5 -
Contest Gallery <= 28.1.5 - Unauthenticated Privilege Escalation Admin Account Takeover via Registration Confirmation Email-to-ID Type Confusion
The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-based login endpoint in `ajax-functions-frontend.php`. When the non-default `RegMailOptional=1` setting is enabled, an attacker can register with a crafted email starting with the target user ID (e.g., `1poc@example.test`), trigger the confirmation flow to overwrite the admin's `user_activation_key` via MySQL integer coercion, and then use the `post_cg1l_login_user_by_key` AJAX action to authenticate as the admin without any credentials. This makes it possible for unauthenticated attackers to take over any WordPress administrator account and gain full site control.
PublishedMar 23, 2026Affected ProductContest Gallery – Upload & Vote Photos, Media, Sell with PayPal & StripePlugin · contest-galleryAffected if you're usingVersions up to 28.1.5Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in28.1.6Update to this version or a newer safe release.What to doUpdate to version 28.1.6, or a newer patched version
Affected versionsVersions up to 28.1.5Safe / patched versions28.1.6 -
Woocommerce Custom Product Addons Pro <= 5.4.1 - Unauthenticated Remote Code Execution via Custom Pricing Formula
The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injection. This makes it possible for unauthenticated attackers to execute arbitrary code on the server by submitting a crafted value to a WCPA text field configured with custom pricing formula (pricingType: "custom" with {this.value}).
PublishedMar 23, 2026Affected ProductWoocommerce Custom Product Addons ProPlugin · woo-custom-product-addons-proAffected if you're usingVersions up to 5.4.1Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in5.4.2Update to this version or a newer safe release.What to doUpdate to version 5.4.2, or a newer patched version
Affected versionsVersions up to 5.4.1Safe / patched versions5.4.2 -
JupiterX Core <= 4.14.1 - Authenticated (Subscriber+) Missing Authorization To Limited File Upload via Popup Template Import
The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server configuration
PublishedMar 23, 2026Affected ProductJupiter X CorePlugin · jupiterx-coreAffected if you're usingVersions up to 4.14.1Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.14.2Update to this version or a newer safe release.What to doUpdate to version 4.14.2, or a newer patched version
Affected versionsVersions up to 4.14.1Safe / patched versions4.14.2 -
WP Job Portal <= 2.4.8 - Unauthenticated SQL Injection via 'radius' Parameter
The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
PublishedMar 23, 2026Affected ProductWP Job Portal – AI-Powered Recruitment System for Company or Job Board websitePlugin · wp-job-portalAffected if you're usingVersions up to 2.4.8Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in2.4.9Update to this version or a newer safe release.What to doUpdate to version 2.4.9, or a newer patched version
Affected versionsVersions up to 2.4.8Safe / patched versions2.4.9 -
Quiz and Survey Master (QSM) <= 10.3.5 - Authenticated (Contributor+) SQL Injection via 'merged_question' Parameter
The Quiz and Survey Master (QSM) plugin for WordPress is vulnerable to SQL Injection via the 'merged_question' parameter in all versions up to, and including, 10.3.5. This is due to insufficient sanitization of user-supplied input before being used in a SQL query. The sanitize_text_field() function applied to the merged_question parameter does not prevent SQL metacharacters like ), OR, AND, and # from being included in the value, which is then directly concatenated into a SQL IN() clause without using $wpdb->prepare() or casting values to integers. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
PublishedMar 23, 2026Affected ProductQuiz and Survey Master (QSM) – Easy Quiz and Survey MakerPlugin · quiz-master-nextAffected if you're usingVersions up to 10.3.5Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in11.0.0Update to this version or a newer safe release.What to doUpdate to version 11.0.0, or a newer patched version
Affected versionsVersions up to 10.3.5Safe / patched versions11.0.0
Browse high-interest plugin and theme vulnerability hubs.
Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.