Scan WordPress with VulnTitan.
Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.
-
Elementor Website Builder <= 3.35.7 - Incorrect Authorization to Authenticated (Contributor+) Sensitive Information Exposure via Elementor Template
The Elementor Website Builder plugin for WordPress is vulnerable to Incorrect Authorization to Sensitive Information Exposure in all versions up to, and including, 3.35.7. This is due to a logic error in the is_allowed_to_read_template() function permission check that treats non-published templates as readable without verifying edit capabilities. This makes it possible for authenticated attackers, with contributor-level access and above, to read private or draft Elementor template content via the 'template_id' supplied to the 'get_template_data' action of the 'elementor_ajax' endpoint.
PublishedMar 25, 2026Affected ProductElementor Website Builder – More Than Just a Page BuilderPlugin · elementorAffected if you're usingVersions up to 3.35.7Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.35.8Update to this version or a newer safe release.What to doUpdate to version 3.35.8, or a newer patched version
Affected versionsVersions up to 3.35.7Safe / patched versions3.35.8 -
Amelia Booking <= 9.1.2 - Authenticated (Customer+) Insecure Direct Object Reference to Arbitrary User Password Change
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with customer-level permissions or above to change user passwords and potentially take over administrator accounts. The vulnerability is in the pro plugin, which has the same slug.
PublishedMar 25, 2026Affected ProductBooking for Appointments and Events Calendar – AmeliaPlugin · ameliabookingAffected if you're usingVersions up to 9.1.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in9.2Update to this version or a newer safe release.What to doUpdate to version 9.2, or a newer patched version
Affected versionsVersions up to 9.1.2Safe / patched versions9.2 -
FormLift for Infusionsoft Web Forms <= 7.5.21 - Missing Authorization to Unauthenticated Infusionsoft Connection Hijack via OAuth Connection Flow
The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 7.5.21. This is due to missing capability checks on the connect() and listen_for_tokens() methods of the FormLift_Infusionsoft_Manager class, both of which are hooked to 'plugins_loaded' and execute on every page load. The connect() function generates an OAuth connection password and leaks it in the redirect Location header without verifying the requesting user is authenticated or authorized. The listen_for_tokens() function only validates the temporary password but performs no user authentication before calling update_option() to save attacker-controlled OAuth tokens and app domain. This makes it possible for unauthenticated attackers to hijack the site's Infusionsoft connection by first triggering the OAuth flow to obtain the temporary password, then using that password to set arbitrary OAuth tokens and app domain via update_option(), effectively redirecting the plugin's API communication to an attacker-controlled server.
PublishedMar 25, 2026Affected ProductFormLift for Infusionsoft Web FormsPlugin · formliftAffected if you're usingVersions up to 7.5.21Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in7.5.22Update to this version or a newer safe release.What to doUpdate to version 7.5.22, or a newer patched version
Affected versionsVersions up to 7.5.21Safe / patched versions7.5.22 -
Blog2Social: Social Media Auto Post & Scheduler <= 8.8.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Meta Deletion via 'b2s_reset_social_meta_tags' AJAX Action
The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized data loss in all versions up to, and including, 8.8.2. This is due to the resetSocialMetaTags() function only verifying that the user has the 'read' capability and a valid b2s_security_nonce, both of which are available to Subscriber-level users, as the plugin grants 'blog2social_access' capability to all roles upon activation, allowing them to access the plugin's admin pages where the nonce is output. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all _b2s_post_meta records from the wp_postmeta table, permanently removing all custom social media meta tags for every post on the site.
PublishedMar 25, 2026Affected ProductBlog2Social: Social Media Auto Post & SchedulerPlugin · blog2socialAffected if you're usingVersions up to 8.8.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in8.8.3Update to this version or a newer safe release.What to doUpdate to version 8.8.3, or a newer patched version
Affected versionsVersions up to 8.8.2Safe / patched versions8.8.3 -
BWL Advanced FAQ Manager Lite <= 1.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'sbox_id' Shortcode Attribute
The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'baf_sbox' shortcode in all versions up to and including 1.1.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'sbox_id', 'sbox_class', 'placeholder', 'highlight_color', 'highlight_bg', and 'cont_ext_class'. These attributes are directly interpolated into HTML element attributes without any esc_attr() escaping in the baf_sbox() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
PublishedMar 25, 2026Affected ProductBWL Advanced FAQ Manager LitePlugin · bwl-advanced-faq-manager-liteAffected if you're usingVersions up to 1.1.1Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in1.1.2Update to this version or a newer safe release.What to doUpdate to version 1.1.2, or a newer patched version
Affected versionsVersions up to 1.1.1Safe / patched versions1.1.2 -
Frontend Admin by DynamiApps <= 3.28.31 - Authenticated (Editor+) PHP Object Injection via 'post_content' of Admin Form Posts
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.
PublishedMar 25, 2026Affected ProductFrontend Admin by DynamiAppsPlugin · acf-frontend-form-elementAffected if you're usingVersions up to 3.28.31Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.28.32Update to this version or a newer safe release.What to doUpdate to version 3.28.32, or a newer patched version
Affected versionsVersions up to 3.28.31Safe / patched versions3.28.32 -
FloristPress for Woo <= 7.8.2 - Reflected Cross-Site Scripting via 'noresults' Parameter
The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'noresults' parameter in all versions up to, and including, 7.8.2 due to insufficient input sanitization and output escaping on the user supplied 'noresults' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
PublishedMar 25, 2026Affected ProductFloristPress for Woo – Customize your eCommerce store for your FloristPlugin · bakkbone-florist-companionAffected if you're usingVersions up to 7.8.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in7.8.3Update to this version or a newer safe release.What to doUpdate to version 7.8.3, or a newer patched version
Affected versionsVersions up to 7.8.2Safe / patched versions7.8.3 -
Masteriyo LMS <= 2.1.6 - Missing Authorization to Authenticated (Student+) Privilege Escalation to Administrator
The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an administrator.
PublishedMar 25, 2026Affected ProductMasteriyo LMS – Online Course Builder for eLearning, LMS & EducationPlugin · learning-management-systemAffected if you're usingVersions up to 2.1.6Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in2.1.7Update to this version or a newer safe release.What to doUpdate to version 2.1.7, or a newer patched version
Affected versionsVersions up to 2.1.6Safe / patched versions2.1.7 -
WP Job Portal <= 2.4.9 - Authenticated (Subscriber+) Arbitrary File Deletion via Resume Custom File Field
The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
PublishedMar 25, 2026Affected ProductWP Job Portal – AI-Powered Recruitment System for Company or Job Board websitePlugin · wp-job-portalAffected if you're usingVersions up to 2.4.9Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in2.5.0Update to this version or a newer safe release.What to doUpdate to version 2.5.0, or a newer patched version
Affected versionsVersions up to 2.4.9Safe / patched versions2.5.0 -
Blackhole for Bad Bots <= 3.8 - Unauthenticated Stored Cross-Site Scripting via User-Agent HTTP Header
The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP header in all versions up to and including 3.8. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() when capturing bot data (which strips HTML tags but does not escape HTML entities like double quotes), then stores the data via update_option(). When an administrator views the Bad Bots log page, the stored data is output directly into HTML input value attributes (lines 75-83) without esc_attr() and into HTML span content without esc_html(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the Blackhole Bad Bots admin page.
PublishedMar 25, 2026Affected ProductBlackhole for Bad BotsPlugin · blackhole-bad-botsAffected if you're usingVersions up to 3.8Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.8.1Update to this version or a newer safe release.What to doUpdate to version 3.8.1, or a newer patched version
Affected versionsVersions up to 3.8Safe / patched versions3.8.1
Browse high-interest plugin and theme vulnerability hubs.
Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.