VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,881 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Theme High Patched: Yes CVSS 8.8/10
    Betheme <= 28.4 - Authenticated (Author+) Arbitrary File Upload to Remote Code Execution via Icon Pack Upload

    The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow moving and unzipping user-controlled ZIP files into a public uploads directory without validating extracted file types. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files (including PHP) and achieve remote code execution via the Icons icon-pack upload flow.

    Published
    May 04, 2026
    Affected Product
    Betheme
    Theme · betheme
    Affected window
    Versions up to 28.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 28.4.1
    Recommended next step
    Update to 28.4.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 28.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    28.4.1
    Update to this version or a newer safe release.
    What to do

    Update to version 28.4.1, or a newer patched version

    Affected versions
    Versions up to 28.4
    Safe / patched versions
    28.4.1
  • Theme Medium Patched: Yes CVSS 6.5/10
    Betheme <= 28.4 - Authenticated (Contributor+) Arbitrary File Deletion via 'mfn-icon-upload'

    The Betheme theme for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 28.4. This is due to the upload_icons() function workflow using a user-controlled upload path (`mfn-icon-upload`) in a filesystem move operation without constraining it to the uploads directory. This makes it possible for authenticated attackers, with contributor-level access and above, to move/delete arbitrary local files via path traversal.

    Published
    May 04, 2026
    Affected Product
    Betheme
    Theme · betheme
    Affected window
    Versions up to 28.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 28.4.1
    Recommended next step
    Update to 28.4.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 28.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    28.4.1
    Update to this version or a newer safe release.
    What to do

    Update to version 28.4.1, or a newer patched version

    Affected versions
    Versions up to 28.4
    Safe / patched versions
    28.4.1
  • Plugin Medium Patched: Yes CVSS 4.3/10
    User Registration & Membership <= 5.1.4 - Missing Authorization to Authenticated (Contributor+) Limited Page Content Modification

    The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `embed_form_action()` function in all versions up to, and including, 5.1.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to append shortcode content to arbitrary pages they do not own or have permission to edit.

    Published
    May 04, 2026
    Affected Product
    User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
    Plugin · user-registration
    Affected window
    Versions up to 5.1.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.5
    Recommended next step
    Update to 5.1.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.5, or a newer patched version

    Affected versions
    Versions up to 5.1.4
    Safe / patched versions
    5.1.5
  • Plugin High Patched: Yes CVSS 7.5/10
    Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder <= 1.15.42 - Unauthenticated SQL Injection via 'inputs'

    The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to SQL Injection via the 'inputs' parameter in versions up to, and including, 1.15.42 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 04, 2026
    Affected Product
    Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
    Plugin · form-maker
    Affected window
    Versions up to 1.15.42
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.15.43
    Recommended next step
    Update to 1.15.43
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.15.42
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.15.43
    Update to this version or a newer safe release.
    What to do

    Update to version 1.15.43, or a newer patched version

    Affected versions
    Versions up to 1.15.42
    Safe / patched versions
    1.15.43
  • Plugin Medium Patched: Yes CVSS 6.5/10
    GenerateBlocks <= 2.2.0 - Insecure Direct Object Reference to Authenticated (Contributor+) Sensitive Information Exposure via Dynamic Tag Replacements

    The GenerateBlocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.0. This is due to missing object-level authorization checks in the /wp-json/generateblocks/v1/dynamic-tag-replacements REST endpoint. The endpoint only verifies that the user has the edit_posts capability but does not verify the user has permission to access the specific post or its associated data referenced by attacker-controlled id parameters in dynamic tag content. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive information from arbitrary posts including author email addresses and non-protected post meta values by crafting dynamic tag payloads such as {{post_meta id:|key:}} and {{post_title id:|link:author_email}}.

    Published
    May 04, 2026
    Affected Product
    GenerateBlocks
    Plugin · generateblocks
    Affected window
    Versions up to 2.2.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.2.1
    Recommended next step
    Update to 2.2.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.2.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.2.1
    Update to this version or a newer safe release.
    What to do

    Update to version 2.2.1, or a newer patched version

    Affected versions
    Versions up to 2.2.0
    Safe / patched versions
    2.2.1
  • Plugin High Patched: Yes CVSS 7.5/10
    Forminator Forms – Contact Form, Payment Form & Custom Form Builder <= 1.52.1 - Unauthenticated Arbitrary File Read via 'upload-1[file][file_path]'

    The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 1.52.1 via the 'upload-1[file][file_path]' parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. Successful exploitation requires a publicly accessible form with a File Upload field where Save and Continue is enabled in that form's Behavior settings and the Save and Continue email notification is configured to attach uploaded files in Email Notifications.

    Published
    May 04, 2026
    Affected Product
    Forminator Forms – Contact Form, Payment Form & Custom Form Builder
    Plugin · forminator
    Affected window
    Versions up to 1.52.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.52.2
    Recommended next step
    Update to 1.52.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.52.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.52.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.52.2, or a newer patched version

    Affected versions
    Versions up to 1.52.1
    Safe / patched versions
    1.52.2
  • Plugin High Patched: Yes CVSS 7.5/10
    WeePie Cookie Allow <= 3.4.11 - Unauthenticated SQL Injection via 'consent' Parameter

    The WeePie Cookie Allow plugin for WordPress is vulnerable to SQL Injection via the 'consent' parameter in all versions up to, and including, 3.4.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 04, 2026
    Affected Product
    WeePie Cookie Allow
    Plugin · wp-cookie-allow
    Affected window
    Versions up to 3.4.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.4.12
    Recommended next step
    Update to 3.4.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.4.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.4.12
    Update to this version or a newer safe release.
    What to do

    Update to version 3.4.12, or a newer patched version

    Affected versions
    Versions up to 3.4.11
    Safe / patched versions
    3.4.12
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Forminator – Contact Form, Payment Form & Custom Form Builder <= 1.52.0 - Missing Authorization to Unauthenticated Stripe PaymentIntent Reuse / Underpayment Bypass via 'paymentid' Parameter

    The Forminator plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.52.0. This is due to the plugin not properly verifying that a user is authorized to perform an action when processing attacker-supplied Stripe PaymentIntent identifiers in the public payment flow. This makes it possible for unauthenticated attackers to submit high-value paid forms as completed by reusing a previously succeeded low-value Stripe PaymentIntent, resulting in underpayment/payment bypass conditions.

    Published
    May 04, 2026
    Affected Product
    Forminator Forms – Contact Form, Payment Form & Custom Form Builder
    Plugin · forminator
    Affected window
    Versions up to 1.52.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.52.1
    Recommended next step
    Update to 1.52.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.52.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.52.1
    Update to this version or a newer safe release.
    What to do

    Update to version 1.52.1, or a newer patched version

    Affected versions
    Versions up to 1.52.0
    Safe / patched versions
    1.52.1
  • Plugin Medium Patched: Yes CVSS 6.5/10
    ElementsKit Elementor Addons <= 3.8.2 - Missing Authorization to Unauthenticated Widget Content Overwrite

    The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `Live_Action::reset()` function in all versions up to, and including, 3.8.2 The function is hooked to the WordPress `init` action and triggers when both `post` and `action=elementor` GET parameters are present, with no authentication or nonce verification. This makes it possible for unauthenticated attackers to overwrite the Elementor content (`_elementor_data`) of any `elementskit_widget` custom post type by visiting a specially crafted URL. The widget's custom designs, text, and configurations are permanently replaced with a blank template.

    Published
    May 04, 2026
    Affected Product
    ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor
    Plugin · elementskit-lite
    Affected window
    Versions up to 3.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.9.0
    Recommended next step
    Update to 3.9.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.9.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.9.0, or a newer patched version

    Affected versions
    Versions up to 3.8.2
    Safe / patched versions
    3.9.0
  • Plugin Critical Patched: Yes CVSS 9.8/10
    GeekyBot <= 1.2.2 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation via 'geekybot_frontendajax' AJAX Action

    The Geeky Bot plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.2.2. This is due to a nopriv AJAX route allowing attacker-controlled model/function dispatch and reaching a plugin installer helper that downloads and unzips attacker-supplied ZIP files into wp-content/plugins/. This makes it possible for unauthenticated attackers to perform arbitrary plugin installation and achieve remote code execution.

    Published
    May 04, 2026
    Affected Product
    GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content
    Plugin · geeky-bot
    Affected window
    Versions up to 1.2.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.3
    Recommended next step
    Update to 1.2.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.3
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.3, or a newer patched version

    Affected versions
    Versions up to 1.2.2
    Safe / patched versions
    1.2.3
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,881 indexed records 14,480 tracked plugins 1,602 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog