VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,734 results Updated continuously
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Elementor Website Builder <= 3.35.7 - Incorrect Authorization to Authenticated (Contributor+) Sensitive Information Exposure via Elementor Template

    The Elementor Website Builder plugin for WordPress is vulnerable to Incorrect Authorization to Sensitive Information Exposure in all versions up to, and including, 3.35.7. This is due to a logic error in the is_allowed_to_read_template() function permission check that treats non-published templates as readable without verifying edit capabilities. This makes it possible for authenticated attackers, with contributor-level access and above, to read private or draft Elementor template content via the 'template_id' supplied to the 'get_template_data' action of the 'elementor_ajax' endpoint.

    Published
    Mar 25, 2026
    Affected Product
    Elementor Website Builder – More Than Just a Page Builder
    Plugin · elementor
    Affected if you're using
    Versions up to 3.35.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.35.8
    Update to this version or a newer safe release.
    What to do

    Update to version 3.35.8, or a newer patched version

    Affected versions
    Versions up to 3.35.7
    Safe / patched versions
    3.35.8
  • Plugin High Patched: Yes CVSS 8.8/10
    Amelia Booking <= 9.1.2 - Authenticated (Customer+) Insecure Direct Object Reference to Arbitrary User Password Change

    The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with customer-level permissions or above to change user passwords and potentially take over administrator accounts. The vulnerability is in the pro plugin, which has the same slug.

    Published
    Mar 25, 2026
    Affected Product
    Booking for Appointments and Events Calendar – Amelia
    Plugin · ameliabooking
    Affected if you're using
    Versions up to 9.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.2
    Update to this version or a newer safe release.
    What to do

    Update to version 9.2, or a newer patched version

    Affected versions
    Versions up to 9.1.2
    Safe / patched versions
    9.2
  • Plugin Medium Patched: Yes CVSS 5.3/10
    FormLift for Infusionsoft Web Forms <= 7.5.21 - Missing Authorization to Unauthenticated Infusionsoft Connection Hijack via OAuth Connection Flow

    The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 7.5.21. This is due to missing capability checks on the connect() and listen_for_tokens() methods of the FormLift_Infusionsoft_Manager class, both of which are hooked to 'plugins_loaded' and execute on every page load. The connect() function generates an OAuth connection password and leaks it in the redirect Location header without verifying the requesting user is authenticated or authorized. The listen_for_tokens() function only validates the temporary password but performs no user authentication before calling update_option() to save attacker-controlled OAuth tokens and app domain. This makes it possible for unauthenticated attackers to hijack the site's Infusionsoft connection by first triggering the OAuth flow to obtain the temporary password, then using that password to set arbitrary OAuth tokens and app domain via update_option(), effectively redirecting the plugin's API communication to an attacker-controlled server.

    Published
    Mar 25, 2026
    Affected Product
    FormLift for Infusionsoft Web Forms
    Plugin · formlift
    Affected if you're using
    Versions up to 7.5.21
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.5.22
    Update to this version or a newer safe release.
    What to do

    Update to version 7.5.22, or a newer patched version

    Affected versions
    Versions up to 7.5.21
    Safe / patched versions
    7.5.22
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Blog2Social: Social Media Auto Post & Scheduler <= 8.8.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Meta Deletion via 'b2s_reset_social_meta_tags' AJAX Action

    The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized data loss in all versions up to, and including, 8.8.2. This is due to the resetSocialMetaTags() function only verifying that the user has the 'read' capability and a valid b2s_security_nonce, both of which are available to Subscriber-level users, as the plugin grants 'blog2social_access' capability to all roles upon activation, allowing them to access the plugin's admin pages where the nonce is output. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all _b2s_post_meta records from the wp_postmeta table, permanently removing all custom social media meta tags for every post on the site.

    Published
    Mar 25, 2026
    Affected Product
    Blog2Social: Social Media Auto Post & Scheduler
    Plugin · blog2social
    Affected if you're using
    Versions up to 8.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.8.3
    Update to this version or a newer safe release.
    What to do

    Update to version 8.8.3, or a newer patched version

    Affected versions
    Versions up to 8.8.2
    Safe / patched versions
    8.8.3
  • Plugin Medium Patched: Yes CVSS 6.4/10
    BWL Advanced FAQ Manager Lite <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'sbox_id' Shortcode Attribute

    The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'baf_sbox' shortcode in all versions up to and including 1.1.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'sbox_id', 'sbox_class', 'placeholder', 'highlight_color', 'highlight_bg', and 'cont_ext_class'. These attributes are directly interpolated into HTML element attributes without any esc_attr() escaping in the baf_sbox() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 25, 2026
    Affected Product
    BWL Advanced FAQ Manager Lite
    Plugin · bwl-advanced-faq-manager-lite
    Affected if you're using
    Versions up to 1.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.2, or a newer patched version

    Affected versions
    Versions up to 1.1.1
    Safe / patched versions
    1.1.2
  • Plugin High Patched: Yes CVSS 7.2/10
    Frontend Admin by DynamiApps <= 3.28.31 - Authenticated (Editor+) PHP Object Injection via 'post_content' of Admin Form Posts

    The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.

    Published
    Mar 25, 2026
    Affected Product
    Frontend Admin by DynamiApps
    Plugin · acf-frontend-form-element
    Affected if you're using
    Versions up to 3.28.31
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.28.32
    Update to this version or a newer safe release.
    What to do

    Update to version 3.28.32, or a newer patched version

    Affected versions
    Versions up to 3.28.31
    Safe / patched versions
    3.28.32
  • Plugin Medium Patched: Yes CVSS 6.1/10
    FloristPress for Woo <= 7.8.2 - Reflected Cross-Site Scripting via 'noresults' Parameter

    The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'noresults' parameter in all versions up to, and including, 7.8.2 due to insufficient input sanitization and output escaping on the user supplied 'noresults' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    Published
    Mar 25, 2026
    Affected Product
    FloristPress for Woo – Customize your eCommerce store for your Florist
    Plugin · bakkbone-florist-companion
    Affected if you're using
    Versions up to 7.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    7.8.3
    Update to this version or a newer safe release.
    What to do

    Update to version 7.8.3, or a newer patched version

    Affected versions
    Versions up to 7.8.2
    Safe / patched versions
    7.8.3
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Masteriyo LMS <= 2.1.6 - Missing Authorization to Authenticated (Student+) Privilege Escalation to Administrator

    The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an administrator.

    Published
    Mar 25, 2026
    Affected Product
    Masteriyo LMS – Online Course Builder for eLearning, LMS & Education
    Plugin · learning-management-system
    Affected if you're using
    Versions up to 2.1.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.7
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.7, or a newer patched version

    Affected versions
    Versions up to 2.1.6
    Safe / patched versions
    2.1.7
  • Plugin High Patched: Yes CVSS 8.8/10
    WP Job Portal <= 2.4.9 - Authenticated (Subscriber+) Arbitrary File Deletion via Resume Custom File Field

    The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

    Published
    Mar 25, 2026
    Affected Product
    WP Job Portal – AI-Powered Recruitment System for Company or Job Board website
    Plugin · wp-job-portal
    Affected if you're using
    Versions up to 2.4.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.5.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.5.0, or a newer patched version

    Affected versions
    Versions up to 2.4.9
    Safe / patched versions
    2.5.0
  • Plugin High Patched: Yes CVSS 7.2/10
    Blackhole for Bad Bots <= 3.8 - Unauthenticated Stored Cross-Site Scripting via User-Agent HTTP Header

    The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP header in all versions up to and including 3.8. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() when capturing bot data (which strips HTML tags but does not escape HTML entities like double quotes), then stores the data via update_option(). When an administrator views the Bad Bots log page, the stored data is output directly into HTML input value attributes (lines 75-83) without esc_attr() and into HTML span content without esc_html(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the Blackhole Bad Bots admin page.

    Published
    Mar 25, 2026
    Affected Product
    Blackhole for Bad Bots
    Plugin · blackhole-bad-bots
    Affected if you're using
    Versions up to 3.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.8.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.8.1, or a newer patched version

    Affected versions
    Versions up to 3.8
    Safe / patched versions
    3.8.1
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,734 indexed records 14,274 tracked plugins 1,481 tracked themes