Scan WordPress with VulnTitan.
Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.
-
User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration <= 4.2.8 - Missing Authorization to Unauthenticated Arbitrary Post Modification via 'post_id' Parameter
The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the draft_post() function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to modify arbitrary posts (e.g. unpublish published posts and overwrite the contents) via the 'post_id' parameter.
PublishedMar 14, 2026Affected ProductUser Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User RegistrationPlugin · wp-user-frontendAffected if you're usingVersions up to 4.2.8Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.2.9Update to this version or a newer safe release.What to doUpdate to version 4.2.9, or a newer patched version
Affected versionsVersions up to 4.2.8Safe / patched versions4.2.9 -
NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.9 - Missing Authorization to Unauthenticated Arbitrary Form Entry Modification via nf_set_entry_update_id
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9.1.9 via the submit_nex_form() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to to overwrite arbitrary form entries via the 'nf_set_entry_update_id' parameter.
PublishedMar 14, 2026Affected ProductNEX-Forms – Ultimate Forms Plugin for WordPressPlugin · nex-forms-express-wp-form-builderAffected if you're usingVersions up to 9.1.9Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in9.1.10Update to this version or a newer safe release.What to doUpdate to version 9.1.10, or a newer patched version
Affected versionsVersions up to 9.1.9Safe / patched versions9.1.10 -
Wicked Folders <= 4.1.0 - Insecure Direct Object Reference to Authenticated (Contributor+) Arbitrary Folder Deletion
The Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the delete_folders() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders created by other users.
PublishedMar 14, 2026Affected ProductWicked Folders – Folder Organizer for Pages, Posts, and Custom Post TypesPlugin · wicked-foldersAffected if you're usingVersions up to 4.1.0Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.1.1Update to this version or a newer safe release.What to doUpdate to version 4.1.1, or a newer patched version
Affected versionsVersions up to 4.1.0Safe / patched versions4.1.1 -
Thim Kit for Elementor <= 1.3.7 - Missing Authorization to Unauthenticated Private Course Disclosure
The Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing validation checks on the 'thim-ekit/archive-course/get-courses' REST endpoint callback function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to disclose private or draft LearnPress course content by supplying post_status in the params_url payload.
PublishedMar 14, 2026Affected ProductThim Kit for Elementor – Pre-built Templates & Widgets for ElementorPlugin · thim-elementor-kitAffected if you're usingVersions up to 1.3.7Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in1.3.8Update to this version or a newer safe release.What to doUpdate to version 1.3.8, or a newer patched version
Affected versionsVersions up to 1.3.7Safe / patched versions1.3.8 -
NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.9 - Missing Authorization to Authenticated (Subscriber+) License Deactivation via deactivate_license
The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_license() function in all versions up to, and including, 9.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to to deactivate the plugin license.
PublishedMar 13, 2026Affected ProductNEX-Forms – Ultimate Forms Plugin for WordPressPlugin · nex-forms-express-wp-form-builderAffected if you're usingVersions up to 9.1.9Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in9.1.10Update to this version or a newer safe release.What to doUpdate to version 9.1.10, or a newer patched version
Affected versionsVersions up to 9.1.9Safe / patched versions9.1.10 -
Social Icons Widget & Block <= 4.5.8 - Missing Authorization to Authenticated (Subscriber+) Sharing Configuration Creation
The Social Icons Widget & Block by WPZOOM plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check in the add_menu_item() method hooked to admin_menu in all versions up to, and including, 4.5.8. This is due to the method performing wp_insert_post() and update_post_meta() calls to create a sharing configuration without verifying the current user has administrator-level capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger the creation of a published wpzoom-sharing configuration post with default sharing button settings, which causes social sharing buttons to be automatically injected into all post content on the frontend via the the_content filter.
PublishedMar 12, 2026Affected ProductSocial Icons Widget & Block – Social Media Icons & Share ButtonsPlugin · social-icons-widget-by-wpzoomAffected if you're usingVersions up to 4.5.8Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.5.9Update to this version or a newer safe release.What to doUpdate to version 4.5.9, or a newer patched version
Affected versionsVersions up to 4.5.8Safe / patched versions4.5.9 -
Calculated Fields Form <= 5.4.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Form Settings
The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form settings in all versions up to, and including, 5.4.5.0. This is due to insufficient capability checks on the form settings save handler and insufficient input sanitization of the `fcontent` field in `fhtml` field types. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
PublishedMar 12, 2026Affected ProductCalculated Fields FormPlugin · calculated-fields-formAffected if you're usingVersions up to 5.4.5.0Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in5.4.5.1Update to this version or a newer safe release.What to doUpdate to version 5.4.5.1, or a newer patched version
Affected versionsVersions up to 5.4.5.0Safe / patched versions5.4.5.1 -
GetGenie <= 4.3.2 - Insecure Direct Object Reference to Authenticated (Author+) Stored Cross-Site Scripting via REST API
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar.
PublishedMar 12, 2026Affected ProductGetGenie – AI Content Writer with Keyword Research & SEO Tracking ToolsPlugin · getgenieAffected if you're usingVersions up to 4.3.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.3.3Update to this version or a newer safe release.What to doUpdate to version 4.3.3, or a newer patched version
Affected versionsVersions up to 4.3.2Safe / patched versions4.3.3 -
GetGenie <= 4.3.2 - Insecure Direct Object Reference to Authenticated (Author+) Arbitrary Post Overwrite/Deletion
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2. This is due to missing validation on the `id` parameter in the `create()` method of the `GetGenieChat` REST API endpoint. The method accepts a user-controlled post ID and, when a post with that ID exists, calls `wp_update_post()` without verifying that the current user owns the post or that the post is of the expected `getgenie_chat` type. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite arbitrary posts owned by any user — including Administrators — effectively destroying the original content by changing its `post_type` to `getgenie_chat` and reassigning `post_author` to the attacker.
PublishedMar 12, 2026Affected ProductGetGenie – AI Content Writer with Keyword Research & SEO Tracking ToolsPlugin · getgenieAffected if you're usingVersions up to 4.3.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in4.3.3Update to this version or a newer safe release.What to doUpdate to version 4.3.3, or a newer patched version
Affected versionsVersions up to 4.3.2Safe / patched versions4.3.3 -
Formidable Forms <= 6.28 - Unauthenticated Payment Amount Manipulation via 'item_meta' Parameter
The Formidable Forms plugin for WordPress is vulnerable to an authorization bypass through user-controlled key in all versions up to, and including, 6.28. This is due to the `frm_strp_amount` AJAX handler (`update_intent_ajax`) overwriting the global `$_POST` data with attacker-controlled JSON input and then using those values to recalculate payment amounts via field shortcode resolution in `generate_false_entry()`. The handler relies on a nonce that is publicly exposed in the page's JavaScript (`frm_stripe_vars.nonce`), which provides CSRF protection but not authorization. This makes it possible for unauthenticated attackers to manipulate PaymentIntent amounts before payment completion on forms using dynamic pricing with field shortcodes, effectively paying a reduced amount for goods or services.
PublishedMar 12, 2026Affected ProductFormidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form BuilderPlugin · formidableAffected if you're usingVersions up to 6.28Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in6.29Update to this version or a newer safe release.What to doUpdate to version 6.29, or a newer patched version
Affected versionsVersions up to 6.28Safe / patched versions6.29
Browse high-interest plugin and theme vulnerability hubs.
Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.