VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,500 results Updated continuously
  • Plugin Medium Patched: Yes CVSS 5.3/10
    User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration <= 4.2.8 - Missing Authorization to Unauthenticated Arbitrary Post Modification via 'post_id' Parameter

    The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the draft_post() function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to modify arbitrary posts (e.g. unpublish published posts and overwrite the contents) via the 'post_id' parameter.

    Published
    Mar 14, 2026
    Affected Product
    User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration
    Plugin · wp-user-frontend
    Affected if you're using
    Versions up to 4.2.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.9
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.9, or a newer patched version

    Affected versions
    Versions up to 4.2.8
    Safe / patched versions
    4.2.9
  • Plugin High Patched: Yes CVSS 7.5/10
    NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.9 - Missing Authorization to Unauthenticated Arbitrary Form Entry Modification via nf_set_entry_update_id

    The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9.1.9 via the submit_nex_form() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to to overwrite arbitrary form entries via the 'nf_set_entry_update_id' parameter.

    Published
    Mar 14, 2026
    Affected Product
    NEX-Forms – Ultimate Forms Plugin for WordPress
    Plugin · nex-forms-express-wp-form-builder
    Affected if you're using
    Versions up to 9.1.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.1.10
    Update to this version or a newer safe release.
    What to do

    Update to version 9.1.10, or a newer patched version

    Affected versions
    Versions up to 9.1.9
    Safe / patched versions
    9.1.10
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Wicked Folders <= 4.1.0 - Insecure Direct Object Reference to Authenticated (Contributor+) Arbitrary Folder Deletion

    The Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the delete_folders() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders created by other users.

    Published
    Mar 14, 2026
    Affected Product
    Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types
    Plugin · wicked-folders
    Affected if you're using
    Versions up to 4.1.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.1.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.1.1, or a newer patched version

    Affected versions
    Versions up to 4.1.0
    Safe / patched versions
    4.1.1
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Thim Kit for Elementor <= 1.3.7 - Missing Authorization to Unauthenticated Private Course Disclosure

    The Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing validation checks on the 'thim-ekit/archive-course/get-courses' REST endpoint callback function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to disclose private or draft LearnPress course content by supplying post_status in the params_url payload.

    Published
    Mar 14, 2026
    Affected Product
    Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor
    Plugin · thim-elementor-kit
    Affected if you're using
    Versions up to 1.3.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.8
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.8, or a newer patched version

    Affected versions
    Versions up to 1.3.7
    Safe / patched versions
    1.3.8
  • Plugin Medium Patched: Yes CVSS 4.3/10
    NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.9 - Missing Authorization to Authenticated (Subscriber+) License Deactivation via deactivate_license

    The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_license() function in all versions up to, and including, 9.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to to deactivate the plugin license.

    Published
    Mar 13, 2026
    Affected Product
    NEX-Forms – Ultimate Forms Plugin for WordPress
    Plugin · nex-forms-express-wp-form-builder
    Affected if you're using
    Versions up to 9.1.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.1.10
    Update to this version or a newer safe release.
    What to do

    Update to version 9.1.10, or a newer patched version

    Affected versions
    Versions up to 9.1.9
    Safe / patched versions
    9.1.10
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Social Icons Widget & Block <= 4.5.8 - Missing Authorization to Authenticated (Subscriber+) Sharing Configuration Creation

    The Social Icons Widget & Block by WPZOOM plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check in the add_menu_item() method hooked to admin_menu in all versions up to, and including, 4.5.8. This is due to the method performing wp_insert_post() and update_post_meta() calls to create a sharing configuration without verifying the current user has administrator-level capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger the creation of a published wpzoom-sharing configuration post with default sharing button settings, which causes social sharing buttons to be automatically injected into all post content on the frontend via the the_content filter.

    Published
    Mar 12, 2026
    Affected Product
    Social Icons Widget & Block – Social Media Icons & Share Buttons
    Plugin · social-icons-widget-by-wpzoom
    Affected if you're using
    Versions up to 4.5.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.5.9
    Update to this version or a newer safe release.
    What to do

    Update to version 4.5.9, or a newer patched version

    Affected versions
    Versions up to 4.5.8
    Safe / patched versions
    4.5.9
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Calculated Fields Form <= 5.4.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Form Settings

    The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form settings in all versions up to, and including, 5.4.5.0. This is due to insufficient capability checks on the form settings save handler and insufficient input sanitization of the `fcontent` field in `fhtml` field types. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 12, 2026
    Affected Product
    Calculated Fields Form
    Plugin · calculated-fields-form
    Affected if you're using
    Versions up to 5.4.5.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.5.1
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.5.1, or a newer patched version

    Affected versions
    Versions up to 5.4.5.0
    Safe / patched versions
    5.4.5.1
  • Plugin Medium Patched: Yes CVSS 6.4/10
    GetGenie <= 4.3.2 - Insecure Direct Object Reference to Authenticated (Author+) Stored Cross-Site Scripting via REST API

    The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar.

    Published
    Mar 12, 2026
    Affected Product
    GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools
    Plugin · getgenie
    Affected if you're using
    Versions up to 4.3.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.3.3
    Update to this version or a newer safe release.
    What to do

    Update to version 4.3.3, or a newer patched version

    Affected versions
    Versions up to 4.3.2
    Safe / patched versions
    4.3.3
  • Plugin Medium Patched: Yes CVSS 5.4/10
    GetGenie <= 4.3.2 - Insecure Direct Object Reference to Authenticated (Author+) Arbitrary Post Overwrite/Deletion

    The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2. This is due to missing validation on the `id` parameter in the `create()` method of the `GetGenieChat` REST API endpoint. The method accepts a user-controlled post ID and, when a post with that ID exists, calls `wp_update_post()` without verifying that the current user owns the post or that the post is of the expected `getgenie_chat` type. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite arbitrary posts owned by any user — including Administrators — effectively destroying the original content by changing its `post_type` to `getgenie_chat` and reassigning `post_author` to the attacker.

    Published
    Mar 12, 2026
    Affected Product
    GetGenie – AI Content Writer with Keyword Research & SEO Tracking Tools
    Plugin · getgenie
    Affected if you're using
    Versions up to 4.3.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.3.3
    Update to this version or a newer safe release.
    What to do

    Update to version 4.3.3, or a newer patched version

    Affected versions
    Versions up to 4.3.2
    Safe / patched versions
    4.3.3
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Formidable Forms <= 6.28 - Unauthenticated Payment Amount Manipulation via 'item_meta' Parameter

    The Formidable Forms plugin for WordPress is vulnerable to an authorization bypass through user-controlled key in all versions up to, and including, 6.28. This is due to the `frm_strp_amount` AJAX handler (`update_intent_ajax`) overwriting the global `$_POST` data with attacker-controlled JSON input and then using those values to recalculate payment amounts via field shortcode resolution in `generate_false_entry()`. The handler relies on a nonce that is publicly exposed in the page's JavaScript (`frm_stripe_vars.nonce`), which provides CSRF protection but not authorization. This makes it possible for unauthenticated attackers to manipulate PaymentIntent amounts before payment completion on forms using dynamic pricing with field shortcodes, effectively paying a reduced amount for goods or services.

    Published
    Mar 12, 2026
    Affected Product
    Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder
    Plugin · formidable
    Affected if you're using
    Versions up to 6.28
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.29
    Update to this version or a newer safe release.
    What to do

    Update to version 6.29, or a newer patched version

    Affected versions
    Versions up to 6.28
    Safe / patched versions
    6.29
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,500 indexed records 14,182 tracked plugins 1,465 tracked themes