VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,605 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 5.3/10
    Booking Package <= 1.7.06 - Unauthenticated Price Manipulation via 'amount' Parameter

    The Booking Package plugin for WordPress is vulnerable to Price Manipulation in versions up to, and including, 1.7.06 This is due to the intentForStripe() function passing user-controlled $_POST['amount'] directly to the Stripe PaymentIntent API without validation, and the commitStripe() function ignoring the server-calculated amount when confirming the payment. While the server correctly calculates the booking cost via getAmount() based on services, guests, taxes, and coupons, this calculated amount is never validated against or used to update the PaymentIntent because the critical code in CreditCard.php that would include the calculated amount in the PaymentIntent update is commented out. This makes it possible for unauthenticated attackers to book services at arbitrary prices (e.g., $0.01 instead of $500.00) by manipulating the amount parameter during PaymentIntent creation and completing the booking with the fraudulent payment.

    Published
    Apr 27, 2026
    Affected Product
    Booking Package
    Plugin · booking-package
    Affected window
    Versions up to 1.7.06
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.7.07
    Recommended next step
    Update to 1.7.07
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.06
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.7.07
    Update to this version or a newer safe release.
    What to do

    Update to version 1.7.07, or a newer patched version

    Affected versions
    Versions up to 1.7.06
    Safe / patched versions
    1.7.07
  • Theme Medium Patched: Yes CVSS 6.4/10
    Woostify <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Lity.js Library via data-lity Attribute in Custom HTML Block

    The Woostify plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.5.0 This is due to insufficient input sanitization and output escaping in the bundled Lity.js lightbox library, where user-controlled input from the href attribute is concatenated directly into a jQuery HTML string without sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Woostify
    Theme · woostify
    Affected window
    Versions up to 2.5.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.5.1
    Recommended next step
    Update to 2.5.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.5.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.5.1
    Update to this version or a newer safe release.
    What to do

    Update to version 2.5.1, or a newer patched version

    Affected versions
    Versions up to 2.5.0
    Safe / patched versions
    2.5.1
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Timeline Blocks for Gutenberg <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'titleTag' Block Attribute

    The Timeline Blocks for Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'titleTag' attribute of the timeline-blocks/tb-timeline-blocks block in all versions up to, and including, 1.1.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Timeline Blocks for Gutenberg
    Plugin · timeline-blocks
    Affected window
    Versions up to 1.1.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.11
    Recommended next step
    Update to 1.1.11
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.11
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.11, or a newer patched version

    Affected versions
    Versions up to 1.1.10
    Safe / patched versions
    1.1.11
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Social Post Embed <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Threads Embed

    The Social Post Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Threads embed handler in all versions up to, and including, 2.0.1. This is due to insufficient input sanitization and output escaping on the user-supplied URL. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    Social Post Embed
    Plugin · social-post-embed
    Affected window
    Versions up to 2.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.2
    Recommended next step
    Update to 2.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.2, or a newer patched version

    Affected versions
    Versions up to 2.0.1
    Safe / patched versions
    2.0.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    WPC Smart Messages for WooCommerce <= 4.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attribute

    The WPC Smart Messages for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'text' attribute of the `wpcsm_text_rotator` shortcode in all versions up to, and including, 4.2.8. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 27, 2026
    Affected Product
    WPC Smart Messages for WooCommerce
    Plugin · wpc-smart-messages
    Affected window
    Versions up to 4.2.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.2.9
    Recommended next step
    Update to 4.2.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.2.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.2.9
    Update to this version or a newer safe release.
    What to do

    Update to version 4.2.9, or a newer patched version

    Affected versions
    Versions up to 4.2.8
    Safe / patched versions
    4.2.9
  • Plugin High Patched: Yes CVSS 8.8/10
    LatePoint <= 5.4.1 - Authenticated (Agent+) Privilege Escalation to Administrator via 'connect-customer-to-wp-user' Ability

    The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the connect-customer-to-wp-user ability, which only requires the customer__edit capability granted to the latepoint_agent role by default, without verifying whether the target WordPress user ID belongs to a privileged account. This makes it possible for authenticated attackers with the latepoint_agent role to link any LatePoint customer record to an administrator's WordPress account and subsequently reset the administrator's password via the normal customer password-reset flow, resulting in full site takeover.

    Published
    Apr 27, 2026
    Affected Product
    LatePoint – Calendar Booking Plugin for Appointments and Events
    Plugin · latepoint
    Affected window
    Versions up to 5.4.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.4.2
    Recommended next step
    Update to 5.4.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.4.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.2
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.2, or a newer patched version

    Affected versions
    Versions up to 5.4.1
    Safe / patched versions
    5.4.2
  • Plugin High Patched: Yes CVSS 8.8/10
    Highland Software Custom Role Manager <= 1.0.0 - Authenticated (Subscriber+) Privilege Escalation

    The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked to the personal_options_update action accessible by any authenticated user. This makes it possible for authenticated attackers, with Subscriber-level access or higher, to potentially modify user roles via the profile update form.

    Published
    Apr 26, 2026
    Affected Product
    Highland Software Custom Role Manager
    Plugin · highland-software-custom-role-manager
    Affected window
    Versions up to 1.0.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.1
    Recommended next step
    Update to 1.0.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.1
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.1, or a newer patched version

    Affected versions
    Versions up to 1.0.0
    Safe / patched versions
    1.0.1
  • Plugin Medium Patched: Yes CVSS 6.4/10
    ITERAS <= 1.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

    The ITERAS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes (iteras-ordering, iteras-signup, iteras-paywall-login, iteras-selfservice) in all versions up to and including 1.8.2. This is due to insufficient input sanitization and output escaping in the combine_attributes() function. The function directly concatenates shortcode attribute values into JavaScript code within tags using double-quoted string interpolation (line 489: '"'.$key.'": "'.$value.'"') without any escaping. An attacker can break out of the JavaScript string context by including a double-quote character in a shortcode attribute value and inject arbitrary JavaScript. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 23, 2026
    Affected Product
    ITERAS
    Plugin · iteras
    Affected window
    Versions up to 1.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.8.3
    Recommended next step
    Update to 1.8.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.8.3
    Update to this version or a newer safe release.
    What to do

    Update to version 1.8.3, or a newer patched version

    Affected versions
    Versions up to 1.8.2
    Safe / patched versions
    1.8.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    HubSpot All-In-One Marketing - Forms, Popups, Live Chat <= 11.3.32 - Missing Authorization to Authenticated (Contributor+) Installed Plugin Disclosure

    The HubSpot All-In-One Marketing - Forms, Popups, Live Chat plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 11.3.32 via the leadin/public/admin/class-adminconstants.php file. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract a list of all installed plugins and their versions which can be leveraged for reconnaissance and further attacks.

    Published
    Apr 23, 2026
    Affected Product
    HubSpot All-In-One Marketing – Forms, Popups, Live Chat
    Plugin · leadin
    Affected window
    Versions up to 11.3.32
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 11.3.33
    Recommended next step
    Update to 11.3.33
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 11.3.32
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    11.3.33
    Update to this version or a newer safe release.
    What to do

    Update to version 11.3.33, or a newer patched version

    Affected versions
    Versions up to 11.3.32
    Safe / patched versions
    11.3.33
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Liaison Site Prober <= 1.2.1 - Missing Authorization to Unauthenticated Information Exposure in '/logs' REST API Endpoint

    The Liaison Site Prober plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 1.2.1 via the /wp-json/site-prober/v1/logs REST API endpoint. The permissions_read() permission callback unconditionally returns true (via __return_true()) instead of checking for appropriate capabilities. This makes it possible for unauthenticated attackers to retrieve sensitive audit log data including IP addresses, user IDs, usernames, login/logout events, failed login attempts, and detailed activity descriptions.

    Published
    Apr 23, 2026
    Affected Product
    Liaison Site Prober
    Plugin · liaison-site-prober
    Affected window
    Versions up to 1.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.2
    Recommended next step
    Update to 1.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.2, or a newer patched version

    Affected versions
    Versions up to 1.2.1
    Safe / patched versions
    1.2.2
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,605 indexed records 14,447 tracked plugins 1,570 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog