VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,897 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    Webmention <= 5.6.2 - Authenticated (Subscriber+) Server-Side Request Forgery

    The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 via the 'Tools::read' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

    Published
    Apr 01, 2026
    Affected Product
    Webmention
    Plugin · webmention
    Affected window
    Versions up to 5.6.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.7.0
    Recommended next step
    Update to 5.7.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.6.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.7.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.7.0, or a newer patched version

    Affected versions
    Versions up to 5.6.2
    Safe / patched versions
    5.7.0
  • Plugin High Patched: Yes CVSS 7.2/10
    Webmention <= 5.6.2 - Unauthenticated Blind Server-Side Request Forgery

    The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 in the 'MF2::parse_authorpage' function via the 'Receiver::post' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

    Published
    Apr 01, 2026
    Affected Product
    Webmention
    Plugin · webmention
    Affected window
    Versions up to 5.6.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.7.0
    Recommended next step
    Update to 5.7.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.6.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.7.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.7.0, or a newer patched version

    Affected versions
    Versions up to 5.6.2
    Safe / patched versions
    5.7.0
  • Plugin High Patched: Yes CVSS 7.5/10
    W3 Total Cache <= 2.9.3 - Unauthenticated Security Token Exposure via User-Agent Header

    The W3 Total Cache plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.9.3. This is due to the plugin bypassing its entire output buffering and processing pipeline when the request's User-Agent header contains "W3 Total Cache", which causes raw mfunc/mclude dynamic fragment HTML comments — including the W3TC_DYNAMIC_SECURITY security token — to be rendered in the page source. This makes it possible for unauthenticated attackers to discover the value of the W3TC_DYNAMIC_SECURITY constant by sending a crafted User-Agent header to any page that contains developer-placed dynamic fragment tags, granted the site has the fragment caching feature enabled.

    Published
    Apr 01, 2026
    Affected Product
    W3 Total Cache
    Plugin · w3-total-cache
    Affected window
    Versions up to 2.9.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.9.4
    Recommended next step
    Update to 2.9.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.9.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.9.4
    Update to this version or a newer safe release.
    What to do

    Update to version 2.9.4, or a newer patched version

    Affected versions
    Versions up to 2.9.3
    Safe / patched versions
    2.9.4
  • Plugin High Patched: Yes CVSS 8.1/10
    MW WP Form <= 5.1.0 - Unauthenticated Arbitrary File Move via move_temp_file_to_upload_dir

    The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5.1.0. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled.

    Published
    Apr 01, 2026
    Affected Product
    MW WP Form
    Plugin · mw-wp-form
    Affected window
    Versions up to 5.1.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.1
    Recommended next step
    Update to 5.1.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.1
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.1, or a newer patched version

    Affected versions
    Versions up to 5.1.0
    Safe / patched versions
    5.1.1
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Database for Contact Form 7, WPforms, Elementor forms <= 1.4.9 - Missing Authorization to Authenticated (Contributor+) Sensitive Information Exposure via Shortcode

    The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the entries_shortcode() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract all form submissions - including names, emails, phone numbers.

    Published
    Mar 31, 2026
    Affected Product
    Database for Contact Form 7, WPforms, Elementor forms
    Plugin · contact-form-entries
    Affected window
    Versions up to 1.4.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.5.0
    Recommended next step
    Update to 1.5.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.4.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.5.0, or a newer patched version

    Affected versions
    Versions up to 1.4.9
    Safe / patched versions
    1.5.0
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Amelia <= 2.1.2 - Authenticated (Manager+) SQL Injection via 'sort' Parameter

    The Booking for Appointments and Events Calendar - Amelia plugin for WordPress is vulnerable to SQL Injection via the `sort` parameter in the payments listing endpoint in all versions up to, and including, 2.1.2. This is due to insufficient escaping on the user-supplied `sort` parameter and lack of sufficient preparation on the existing SQL query in `PaymentRepository.php`, where the sort field is interpolated directly into an ORDER BY clause without sanitization or whitelist validation. PDO prepared statements do not protect ORDER BY column names. GET requests also skip Amelia's nonce validation entirely. This makes it possible for authenticated attackers, with Manager-level (`wpamelia-manager`) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection.

    Published
    Mar 31, 2026
    Affected Product
    Booking for Appointments and Events Calendar – Amelia
    Plugin · ameliabooking
    Affected window
    Versions up to 2.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.3
    Recommended next step
    Update to 2.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.3, or a newer patched version

    Affected versions
    Versions up to 2.1.2
    Safe / patched versions
    2.1.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    WP Shortcodes Plugin — Shortcodes Ultimate <= 7.4.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'max_width' Shortcode Attribute

    The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'max_width' attribute of the `su_box` shortcode in all versions up to, and including, 7.4.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 31, 2026
    Affected Product
    WP Shortcodes Plugin — Shortcodes Ultimate
    Plugin · shortcodes-ultimate
    Affected window
    Versions up to 7.4.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 7.5.0
    Recommended next step
    Update to 7.5.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 7.4.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 7.5.0, or a newer patched version

    Affected versions
    Versions up to 7.4.10
    Safe / patched versions
    7.5.0
  • Plugin Medium Patched: Yes CVSS 6.4/10
    King Addons for Elementor <= 51.1.38 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via Multiple Widgets

    The King Addons for Elementor plugin for WordPress is vulnerable to multiple Contributor+ DOM-Based Stored Cross-Site Scripting vulnerabilities in all versions up to, and including, 51.1.38. This is due to insufficient input sanitization and output escaping across multiple widgets and features. The plugin uses esc_attr() and esc_url() within JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM, enabling attackers to break out of the JavaScript context. Additionally, several JavaScript files use unsafe DOM manipulation methods (template literals, .html(), and window.location.href with unvalidated URLs) with user-controlled data. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via Elementor widget settings that execute when a user accesses the injected page or when an administrator previews the page in Elementor's editor. The vulnerability was partially patched in version 5.1.51.

    Published
    Mar 31, 2026
    Affected Product
    King Addons for Elementor – 80+ Elementor Widgets, 4 000+ Elementor Templates, WooCommerce, Mega Menu, Popup Builder
    Plugin · king-addons
    Affected window
    Versions up to 51.1.53
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 51.1.54
    Recommended next step
    Update to 51.1.54
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 51.1.53
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    51.1.54
    Update to this version or a newer safe release.
    What to do

    Update to version 51.1.54, or a newer patched version

    Affected versions
    Versions up to 51.1.53
    Safe / patched versions
    51.1.54
  • Plugin High Patched: Yes CVSS 7.2/10
    Query Monitor <= 3.20.3 - Reflected Cross-Site Scripting via Request URI

    The Query Monitor – The developer tools panel for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘$_SERVER['REQUEST_URI']’ parameter in all versions up to, and including, 3.20.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Query Monitor – The developer tools panel for WordPress
    Plugin · query-monitor
    Affected window
    Versions up to 3.20.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.20.4
    Recommended next step
    Update to 3.20.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.20.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.20.4
    Update to this version or a newer safe release.
    What to do

    Update to version 3.20.4, or a newer patched version

    Affected versions
    Versions up to 3.20.3
    Safe / patched versions
    3.20.4
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Minify HTML <= 2.1.12 - Cross-Site Request Forgery to Plugin Settings Update

    The Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.12. This is due to missing or incorrect nonce validation on the 'minify_html_menu_options' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Mar 30, 2026
    Affected Product
    Minify HTML
    Plugin · minify-html-markup
    Affected window
    Versions up to 2.1.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.13
    Recommended next step
    Update to 2.1.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.13
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.13, or a newer patched version

    Affected versions
    Versions up to 2.1.12
    Safe / patched versions
    2.1.13
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,897 indexed records 14,308 tracked plugins 1,501 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog