VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,039 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    UsersWP <= 1.2.60 - Authenticated (Subscriber+) Stored Cross-Site Scripting via User Badge Link Substitution

    The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts that will execute whenever a user accesses a page containing the affected badge widget.

    Published
    Apr 08, 2026
    Affected Product
    UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP
    Plugin · userswp
    Affected window
    Versions up to 1.2.60
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.61
    Recommended next step
    Update to 1.2.61
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.60
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.61
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.61, or a newer patched version

    Affected versions
    Versions up to 1.2.60
    Safe / patched versions
    1.2.61
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Quick Playground <= 1.3.1 - Missing Authorization to Unauthenticated Arbitrary File Upload

    The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.

    Published
    Apr 08, 2026
    Affected Product
    Quick Playground
    Plugin · quick-playground
    Affected window
    Versions up to 1.3.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.2
    Recommended next step
    Update to 1.3.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.2, or a newer patched version

    Affected versions
    Versions up to 1.3.1
    Safe / patched versions
    1.3.2
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Ultimate FAQ Accordion Plugin <= 2.4.7 - Authenticated (Author+) Stored Cross-Site Scripting via FAQ Content

    The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via FAQ content in all versions up to, and including, 2.4.7. This is due to the plugin calling html_entity_decode() on post_content during rendering in the set_display_variables() function (View.FAQ.class.php, line 746), which converts HTML entity-encoded payloads back into executable HTML, combined with insufficient output escaping in the faq-answer.php template where the decoded content is echoed without wp_kses_post() or any other sanitization. The ufaq custom post type is registered with 'show_in_rest' => true and defaults to 'post' capability_type, allowing Author-level users to create and publish FAQs via the REST API. An Author can submit entity-encoded malicious HTML (e.g., &lt;img src=x onerror=alert()&gt;) which bypasses WordPress's kses sanitization at save time (since kses sees entities as plain text, not tags), but is then decoded back into executable HTML by html_entity_decode() at render time. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in FAQ pages that will execute whenever a user accesses an injected FAQ, either directly or via the [ultimate-faqs] shortcode.

    Published
    Apr 08, 2026
    Affected Product
    Ultimate FAQ Accordion Plugin
    Plugin · ultimate-faqs
    Affected window
    Versions up to 2.4.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.4.8
    Recommended next step
    Update to 2.4.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.4.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.4.8
    Update to this version or a newer safe release.
    What to do

    Update to version 2.4.8, or a newer patched version

    Affected versions
    Versions up to 2.4.7
    Safe / patched versions
    2.4.8
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Download Manager <= 3.3.52 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

    The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sid' parameter of the 'wpdm_members' shortcode in versions up to and including 3.3.52. This is due to insufficient input sanitization and output escaping on the user-supplied 'sid' shortcode attribute. The sid parameter is extracted without sanitization in the members() function and stored via update_post_meta(), then echoed directly into an HTML id attribute in the members.php template without applying esc_attr(). This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page.

    Published
    Apr 08, 2026
    Affected Product
    Download Manager
    Plugin · download-manager
    Affected window
    Versions up to 3.3.52
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.3.53
    Recommended next step
    Update to 3.3.53
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.3.52
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.3.53
    Update to this version or a newer safe release.
    What to do

    Update to version 3.3.53, or a newer patched version

    Affected versions
    Versions up to 3.3.52
    Safe / patched versions
    3.3.53
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Post Blocks & Tools <= 1.3.0 - Authenticated (Author+) Stored Cross-Site Scripting via 'sliderStyle' Block Attribute

    The Post Blocks & Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliderStyle' block attribute in the Posts Slider block in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 08, 2026
    Affected Product
    Post Blocks & Tools
    Plugin · bnm-blocks
    Affected window
    Versions up to 1.3.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.1
    Recommended next step
    Update to 1.3.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.1
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.1, or a newer patched version

    Affected versions
    Versions up to 1.3.0
    Safe / patched versions
    1.3.1
  • Plugin High Patched: Yes CVSS 8.1/10
    MW WP Form <= 5.1.1 - Unauthenticated Arbitrary File Move via regenerate_upload_file_keys

    The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() function, which uses WordPress's path_join() — a function that returns absolute paths unchanged, discarding the intended base directory. The attacker-controlled key is injected via the mwf_upload_files[] POST parameter, which is loaded into the plugin's Data model via _set_request_valiables(). During form processing, regenerate_upload_file_keys() iterates over these keys and calls generate_user_filepath() with the attacker-supplied key as the $name argument — the key survives validation because the targeted file (e.g., wp-config.php) genuinely exists at the absolute path. The _get_attachments() method then re-reads the same surviving keys and passes the resolved file path to move_temp_file_to_upload_dir(), which calls rename() to move the file into the uploads folder. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled.

    Published
    Apr 08, 2026
    Affected Product
    MW WP Form
    Plugin · mw-wp-form
    Affected window
    Versions up to 5.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.1.2
    Recommended next step
    Update to 5.1.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.2, or a newer patched version

    Affected versions
    Versions up to 5.1.1
    Safe / patched versions
    5.1.2
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Advanced CF7 DB <= 2.0.9 - Cross-Site Request Forgery to Form Entry Deletion

    The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the 'vsz_cf7_save_setting_callback' function. This makes it possible for unauthenticated attackers to delete form entry via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    Apr 08, 2026
    Affected Product
    Advanced Contact form 7 DB
    Plugin · advanced-cf7-db
    Affected window
    Versions up to 2.0.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.0
    Recommended next step
    Update to 2.1.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.0, or a newer patched version

    Affected versions
    Versions up to 2.0.9
    Safe / patched versions
    2.1.0
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Advanced CF7 DB <= 2.0.9 - Missing Authorization to Authenticated (Subscriber+) Form Submissions Excel Export

    The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'vsz_cf7_export_to_excel' function in all versions up to, and including, 2.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export form submissions to excel file.

    Published
    Apr 08, 2026
    Affected Product
    Advanced Contact form 7 DB
    Plugin · advanced-cf7-db
    Affected window
    Versions up to 2.0.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.0
    Recommended next step
    Update to 2.1.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.0, or a newer patched version

    Affected versions
    Versions up to 2.0.9
    Safe / patched versions
    2.1.0
  • Plugin Critical Patched: Yes CVSS 9.8/10
    ProSolution WP Client <= 1.9.9 - Unauthenticated Arbitrary File Upload via proSol_fileUploadProcess

    The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

    Published
    Apr 08, 2026
    Affected Product
    ProSolution WP Client
    Plugin · prosolution-wp-client
    Affected window
    Versions up to 1.9.9
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.0
    Recommended next step
    Update to 2.0.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.9.9
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.0, or a newer patched version

    Affected versions
    Versions up to 1.9.9
    Safe / patched versions
    2.0.0
  • Plugin Medium Patched: Yes CVSS 5.4/10
    Ziggeo <= 3.1.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Modification via 'ziggeo_ajax' AJAX Action

    The Ziggeo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1. The wp_ajax_ziggeo_ajax handler only verifies a nonce (check_ajax_referer) but performs no capability checks via current_user_can(). Furthermore, the nonce ('ziggeo_ajax_nonce') is exposed to all logged-in users on every page via the wp_head and admin_head hooks . This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke multiple administrative operations including: saving arbitrary translation strings (translations_panel_save_strings via update_option('ziggeo_translations')), creating/updating/deleting event templates (event_editor_save_template/update_template/remove_template via update_option('ziggeo_events')), modifying SDK application settings (sdk_applications operations), and managing notifications (notification_handler via update_option('ziggeo_notifications')).

    Published
    Apr 08, 2026
    Affected Product
    Ziggeo
    Plugin · ziggeo
    Affected window
    Versions up to 3.1.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.2
    Recommended next step
    Update to 3.1.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.2, or a newer patched version

    Affected versions
    Versions up to 3.1.1
    Safe / patched versions
    3.1.2
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,039 indexed records 14,337 tracked plugins 1,518 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog