VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

36,158 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 4.3/10
    Classified Listing <= 5.3.10 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Modification via add_order_note and send_email_to_user_by_moderator AJAX Actions

    The Classified Listing – AI-Powered Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 5.3.10. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to add arbitrary notes to any order and trigger unsolicited notification and moderation emails to listing owners without administrative authorization.

    Published
    May 14, 2026
    Affected Product
    Classified Listing – AI-Powered Classified ads & Business Directory Plugin
    Plugin · classified-listing
    Affected window
    Versions up to 5.3.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.4.0
    Recommended next step
    Update to 5.4.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.3.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.0
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.0, or a newer patched version

    Affected versions
    Versions up to 5.3.10
    Safe / patched versions
    5.4.0
  • Plugin High Patched: Yes CVSS 8.8/10
    Frontend Admin by DynamiApps <= 3.28.36 - Unauthenticated Privilege Escalation via Edit User Form

    The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 3.28.36. This is due to insufficient authorization checks in the role field update mechanism combined with overly permissive capabilities for the admin_form post type. The admin_form custom post type uses 'capability_type' => 'page', which grants editors the ability to create and edit forms. When an editor creates an edit_user form, they can manipulate the form configuration to include 'administrator' in the role_options array by directly submitting POST data to wp-admin/post.php, bypassing the UI restrictions in feadmin_get_user_roles(). When the form is subsequently submitted, the pre_update_value() function in class-role.php only validates that the submitted role exists in the form's role_options array (lines 107-110), but fails to verify that the current user has permission to assign that specific role. This makes it possible for unauthenticated attackers to first register as editors (via a public new_user form), then create an edit_user form with administrator in the allowed roles, and finally use that form to escalate their own privileges to administrator.

    Published
    May 14, 2026
    Affected Product
    Frontend Admin by DynamiApps
    Plugin · acf-frontend-form-element
    Affected window
    Versions up to 3.28.36
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.29.1
    Recommended next step
    Update to 3.29.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.28.36
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.29.1
    Update to this version or a newer safe release.
    What to do

    Update to version 3.29.1, or a newer patched version

    Affected versions
    Versions up to 3.28.36
    Safe / patched versions
    3.29.1
  • Plugin High Patched: Yes CVSS 7.5/10
    Quick Playground <= 1.3.3 - Unauthenticated Path Traversal to Arbitrary File Read via 'stylesheet' Parameter

    The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.

    Published
    May 14, 2026
    Affected Product
    Quick Playground
    Plugin · quick-playground
    Affected window
    Versions up to 1.3.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.4
    Recommended next step
    Update to 1.3.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.3.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.4
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.4, or a newer patched version

    Affected versions
    Versions up to 1.3.3
    Safe / patched versions
    1.3.4
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Receive Notifications After Form Submitting – Form Notify for Any Forms <= 1.1.10 - Unauthenticated Authentication Bypass via LINE OAuth Callback

    The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OAuth login. When LINE doesn't provide an email address (which is common), the plugin falls back to reading the 'form_notify_line_email' cookie value without verifying that the LINE account is associated with that email address. This makes it possible for unauthenticated attackers to gain access to any user account on the site, including administrator accounts, by completing a LINE OAuth flow with their own LINE account while injecting a malicious cookie containing the target victim's email address.

    Published
    May 14, 2026
    Affected Product
    Receive Notifications After Form Submitting – Form Notify for Any Forms
    Plugin · form-notify
    Affected window
    Versions up to 1.1.10
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.11
    Recommended next step
    Update to 1.1.11
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.10
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.11
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.11, or a newer patched version

    Affected versions
    Versions up to 1.1.10
    Safe / patched versions
    1.1.11
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Notify Odoo <= 1.0.1 - Cross-Site Request Forgery to Settings Update

    The Notify Odoo plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the _updateSettings function. This makes it possible for unauthenticated attackers to change the Notify Odoo URL to an attacker-controlled URL and modify notification, tracking image, and allowed IP address settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    Published
    May 14, 2026
    Affected Product
    Notify Odoo
    Plugin · notify-odoo
    Affected window
    Versions up to 1.0.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.2
    Recommended next step
    Update to 1.0.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.2, or a newer patched version

    Affected versions
    Versions up to 1.0.1
    Safe / patched versions
    1.0.2
  • Plugin Medium Patched: Yes CVSS 4.9/10
    NEX-Forms – Ultimate Forms Plugin for WordPress <= 9.1.12 - Authenticated (Administrator+) SQL Injection via 'table' Parameter

    The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'table' parameter in all versions up to, and including, 9.1.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    May 14, 2026
    Affected Product
    NEX-Forms – Ultimate Forms Plugin for WordPress
    Plugin · nex-forms-express-wp-form-builder
    Affected window
    Versions up to 9.1.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 9.1.13
    Recommended next step
    Update to 9.1.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 9.1.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.1.13
    Update to this version or a newer safe release.
    What to do

    Update to version 9.1.13, or a newer patched version

    Affected versions
    Versions up to 9.1.12
    Safe / patched versions
    9.1.13
  • Theme Medium Patched: Yes CVSS 6.4/10
    The7 <= 14.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode 'link' Parameter

    The The7 theme for WordPress is vulnerable to Stored Cross-Site Scripting via the 'dt_default_button' shortcode in all versions up to, and including, 14.3.2. This is due to insufficient input sanitization and output escaping on the 'title' component of the 'link' shortcode parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 14, 2026
    Affected Product
    The7 — Website and eCommerce Builder for WordPress
    Theme · dt-the7
    Affected window
    Versions up to 14.3.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 14.3.3
    Recommended next step
    Update to 14.3.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 14.3.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    14.3.3
    Update to this version or a newer safe release.
    What to do

    Update to version 14.3.3, or a newer patched version

    Affected versions
    Versions up to 14.3.2
    Safe / patched versions
    14.3.3
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Smartcat Translator for WPML <= 3.1.77 - Missing Authorization to Unauthenticated Plugin Settings Update

    The Smartcat Translator for WPML plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'routeData' REST endpoint in all versions up to, and including, 3.1.77. This makes it possible for unauthenticated attackers to overwrite the plugin's Smartcat API credentials (account ID, API secret key, hub key, API host, and hub host), effectively hijacking the translation service or causing a denial of service.

    Published
    May 14, 2026
    Affected Product
    Smartcat Translator for WPML
    Plugin · smartcat-wpml
    Affected window
    Versions up to 3.1.77
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.1.78
    Recommended next step
    Update to 3.1.78
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.1.77
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.78
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.78, or a newer patched version

    Affected versions
    Versions up to 3.1.77
    Safe / patched versions
    3.1.78
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Advanced Custom Fields: Font Awesome Field <= 5.0.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting via JSON Field

    The Advanced Custom Fields: Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 5.0.2. This is due to insufficient input validation of JSON field values and unsafe client-side HTML construction in the update_preview() JavaScript function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    May 14, 2026
    Affected Product
    Advanced Custom Fields: Font Awesome Field
    Plugin · advanced-custom-fields-font-awesome
    Affected window
    Versions up to 5.0.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.0.0
    Recommended next step
    Update to 6.0.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.0.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.0.0
    Update to this version or a newer safe release.
    What to do

    Update to version 6.0.0, or a newer patched version

    Affected versions
    Versions up to 5.0.2
    Safe / patched versions
    6.0.0
  • Plugin High Patched: Yes CVSS 8.1/10
    FOX – Currency Switcher Professional for WooCommerce <= 1.4.5 - Missing Authorization to Authenticated (Contributor+) Configuration Deletion

    The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the 'admin_head' function in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete the entire multi-currency configuration by visiting any wp-admin page with the `woocs_reset` parameter appended. Additionally, because no nonce is verified, this is also exploitable via Cross-Site Request Forgery against any administrator. The vulnerability may also be exploited by Subscriber-level users if the site is configured to allow Subscriber access to 'wp-admin' pages.

    Published
    May 14, 2026
    Affected Product
    FOX – Currency Switcher Professional for WooCommerce
    Plugin · woocommerce-currency-switcher
    Affected window
    Versions up to 1.4.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.4.6
    Recommended next step
    Update to 1.4.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.4.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.4.6
    Update to this version or a newer safe release.
    What to do

    Update to version 1.4.6, or a newer patched version

    Affected versions
    Versions up to 1.4.5
    Safe / patched versions
    1.4.6
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

36,158 indexed records 14,532 tracked plugins 1,633 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog