VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,969 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    WPFunnels <= 3.7.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'wpf_optin_form' Shortcode

    The WPFunnels – Easy Funnel Builder To Optimize Buyer Journeys And Get More Leads & Sales plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpf_optin_form' shortcode in all versions up to, and including, 3.7.9 due to insufficient input sanitization and output escaping of the 'button_icon' parameter. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 03, 2026
    Affected Product
    WPFunnels – Funnel Builder for WooCommerce with Checkout & One Click Upsell
    Plugin · wpfunnels
    Affected window
    Versions up to 3.7.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.8.0
    Recommended next step
    Update to 3.8.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.7.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.8.0
    Update to this version or a newer safe release.
    What to do

    Update to version 3.8.0, or a newer patched version

    Affected versions
    Versions up to 3.7.9
    Safe / patched versions
    3.8.0
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.16.11 - Unauthenticated Arbitrary Shortcode Execution via Checkout Billing Fields

    The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.11. This is due to the plugin allowing user-supplied billing field values from the checkout process to be interpolated into shortcode template strings that are subsequently processed without proper sanitization of shortcode syntax. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes by submitting crafted billing field values during the checkout process.

    Published
    Apr 03, 2026
    Affected Product
    Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
    Plugin · wp-user-avatar
    Affected window
    Versions up to 4.16.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.16.12
    Recommended next step
    Update to 4.16.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.16.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.16.12
    Update to this version or a newer safe release.
    What to do

    Update to version 4.16.12, or a newer patched version

    Affected versions
    Versions up to 4.16.11
    Safe / patched versions
    4.16.12
  • Plugin High Patched: Yes CVSS 8.8/10
    wpForo Forum <= 2.4.16 - Authenticated (Subscriber+) Arbitrary File Deletion via Post Body

    The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum post body and then deleting the post.

    Published
    Apr 03, 2026
    Affected Product
    wpForo Forum
    Plugin · wpforo
    Affected window
    Versions up to 2.4.16
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.4.17
    Recommended next step
    Update to 2.4.17
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.4.16
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.4.17
    Update to this version or a newer safe release.
    What to do

    Update to version 2.4.17, or a newer patched version

    Affected versions
    Versions up to 2.4.16
    Safe / patched versions
    2.4.17
  • Plugin High Patched: Yes CVSS 7.2/10
    Visitor Traffic Real Time Statistics <= 8.4 - Unauthenticated Stored Cross-Site Scripting

    The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by Title section.

    Published
    Apr 03, 2026
    Affected Product
    Visitor Traffic Real Time Statistics
    Plugin · visitors-traffic-real-time-statistics
    Affected window
    Versions up to 8.4
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 8.5
    Recommended next step
    Update to 8.5
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 8.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    8.5
    Update to this version or a newer safe release.
    What to do

    Update to version 8.5, or a newer patched version

    Affected versions
    Versions up to 8.4
    Safe / patched versions
    8.5
  • Plugin High Patched: Yes CVSS 7.5/10
    Text to Speech (TTS) by Mementor <= 1.9.8 - Use of Hardcoded Password to Unauthenticated Remote Database Access

    The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decode these credentials, gaining unauthorized write access to the vendor's telemetry database.

    Published
    Apr 03, 2026
    Affected Product
    Text to Speech – TTSWP
    Plugin · text-to-speech-tts
    Affected window
    Versions up to 1.9.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.9.9
    Recommended next step
    Update to 1.9.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.9.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.9.9
    Update to this version or a newer safe release.
    What to do

    Update to version 1.9.9, or a newer patched version

    Affected versions
    Versions up to 1.9.8
    Safe / patched versions
    1.9.9
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Listeo-Core - Directory Plugin by Purethemes <= 2.0.27 - Unauthenticated Arbitrary Media Upload

    The Listeo Core plugin for WordPress is vulnerable to unauthenticated arbitrary media upload in all versions up to, and including, 2.0.27 via the "listeo_core_handle_dropped_media" function. This is due to missing authorization and capability checks on the AJAX endpoint handling file uploads. This makes it possible for unauthenticated attackers to upload arbitrary media to the site's media library, without achieving direct code execution.

    Published
    Apr 03, 2026
    Affected Product
    Listeo-Core - Directory Plugin by Purethemes
    Plugin · listeo-core
    Affected window
    Versions up to 2.0.27
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.28
    Recommended next step
    Update to 2.0.28
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.27
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.28
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.28, or a newer patched version

    Affected versions
    Versions up to 2.0.27
    Safe / patched versions
    2.0.28
  • Plugin High Patched: Yes CVSS 7.2/10
    Widgets for Social Photo Feed <= 1.7.9 - Unauthenticated Stored Cross-Site Scripting via feed_data

    The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 03, 2026
    Affected Product
    Widgets for Social Photo Feed
    Plugin · social-photo-feed-widget
    Affected window
    Versions up to 1.7.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.8.0
    Recommended next step
    Update to 1.8.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.8.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.8.0, or a newer patched version

    Affected versions
    Versions up to 1.7.9
    Safe / patched versions
    1.8.0
  • Plugin High Patched: Yes CVSS 7.1/10
    Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.16.11 - Missing Authorization to Authenticated (Subscriber+) Membership Payment Bypass

    The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for authenticated attackers, with subscriber level access and above, to reference another user's active subscription during checkout to manipulate proration calculations, allowing them to obtain paid lifetime membership plans without payment via the `ppress_process_checkout` AJAX action.

    Published
    Apr 03, 2026
    Affected Product
    Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
    Plugin · wp-user-avatar
    Affected window
    Versions up to 4.16.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.16.12
    Recommended next step
    Update to 4.16.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.16.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.16.12
    Update to this version or a newer safe release.
    What to do

    Update to version 4.16.12, or a newer patched version

    Affected versions
    Versions up to 4.16.11
    Safe / patched versions
    4.16.12
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Kadence Blocks — Page Builder Toolkit for Gutenberg Editor <= 3.6.3 - Missing Authorization to Authenticated (Contributor+) Media Upload

    The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.3. This is due to the plugin not properly verifying that a user has the `upload_files` capability in the `process_pattern` REST API endpoint. This makes it possible for authenticated attackers, with contributor level access and above, to upload images to the WordPress Media Library by supplying remote image URLs that the server downloads and creates as media attachments.

    Published
    Apr 03, 2026
    Affected Product
    Kadence Blocks — Page Builder Toolkit for Gutenberg Editor
    Plugin · kadence-blocks
    Affected window
    Versions up to 3.6.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.6.4
    Recommended next step
    Update to 3.6.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.6.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.6.4
    Update to this version or a newer safe release.
    What to do

    Update to version 3.6.4, or a newer patched version

    Affected versions
    Versions up to 3.6.3
    Safe / patched versions
    3.6.4
  • Plugin Medium Patched: Yes CVSS 6.4/10
    WP Travel Engine - Travel and Tour Booking Plugin <= 6.7.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via wte_trip_tax Shortcode

    The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wte_trip_tax' shortcode in all versions up to, and including, 6.7.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 03, 2026
    Affected Product
    WP Travel Engine – Tour Booking Plugin – Tour Operator Software
    Plugin · wp-travel-engine
    Affected window
    Versions up to 6.7.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.7.6
    Recommended next step
    Update to 6.7.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.7.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.7.6
    Update to this version or a newer safe release.
    What to do

    Update to version 6.7.6, or a newer patched version

    Affected versions
    Versions up to 6.7.5
    Safe / patched versions
    6.7.6
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,969 indexed records 14,315 tracked plugins 1,518 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog