VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,094 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 4.3/10
    Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) <= 4.1.8 Missing Authorization to Authenticated (Subscriber+) Order Information Exposure

    The Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) plugin for WordPress is vulnerable to unauthorized access of data due to a improper capability check on the get_item_permissions_check() function in all versions up to, and including, 4.1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary order data including customer PII (name, email, phone) by iterating order IDs.

    Published
    Apr 13, 2026
    Affected Product
    Eventin – Event Calendar, Event Registration, Tickets & Booking (AI Powered)
    Plugin · wp-event-solution
    Affected window
    Versions up to 4.1.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.1.9
    Recommended next step
    Update to 4.1.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.1.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.1.9
    Update to this version or a newer safe release.
    What to do

    Update to version 4.1.9, or a newer patched version

    Affected versions
    Versions up to 4.1.8
    Safe / patched versions
    4.1.9
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Germanized for WooCommerce <= 3.20.5 - Unauthenticated Arbitrary Shortcode Execution

    The The Germanized for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution via 'account_holder' parameter in all versions up to, and including, 3.20.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

    Published
    Apr 13, 2026
    Affected Product
    Germanized for WooCommerce
    Plugin · woocommerce-germanized
    Affected window
    Versions up to 3.20.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.20.6
    Recommended next step
    Update to 3.20.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.20.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.20.6
    Update to this version or a newer safe release.
    What to do

    Update to version 3.20.6, or a newer patched version

    Affected versions
    Versions up to 3.20.5
    Safe / patched versions
    3.20.6
  • Plugin High Patched: Yes CVSS 7.2/10
    Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts <= 3.0.12 - Authenticated (Administrator+) PHP Object Injection

    The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.12 via deserialization of untrusted input in the import_shortcodes() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

    Published
    Apr 13, 2026
    Affected Product
    Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts
    Plugin · post-carousel
    Affected window
    Versions up to 3.0.12
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.0.13
    Recommended next step
    Update to 3.0.13
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.0.12
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.0.13
    Update to this version or a newer safe release.
    What to do

    Update to version 3.0.13, or a newer patched version

    Affected versions
    Versions up to 3.0.12
    Safe / patched versions
    3.0.13
  • Plugin Medium Patched: Yes CVSS 4.4/10
    WholeSale Products Dynamic Pricing Management WooCommerce <= 1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Settings

    The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

    Published
    Apr 13, 2026
    Affected Product
    WholeSale Products Dynamic Pricing Management WooCommerce
    Plugin · wholesale-products-dynamic-pricing-management-woocommerce
    Affected window
    Versions up to 1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.3.0
    Recommended next step
    Update to 1.3.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.3.0
    Update to this version or a newer safe release.
    What to do

    Update to version 1.3.0, or a newer patched version

    Affected versions
    Versions up to 1.2
    Safe / patched versions
    1.3.0
  • Plugin Medium Patched: Yes CVSS 6.4/10
    ShopLentor <= 3.3.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'button_text' Shortcode Attribute

    The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the woolentor_quickview_button shortcode's button_text attribute in all versions up to, and including, 3.3.5. This is due to insufficient input sanitization and missing output escaping on user-supplied shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 13, 2026
    Affected Product
    ShopLentor – All-in-One WooCommerce Growth & Store Enhancement Plugin
    Plugin · woolentor-addons
    Affected window
    Versions up to 3.3.5
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.3.6
    Recommended next step
    Update to 3.3.6
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.3.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.3.6
    Update to this version or a newer safe release.
    What to do

    Update to version 3.3.6, or a newer patched version

    Affected versions
    Versions up to 3.3.5
    Safe / patched versions
    3.3.6
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Surbma | Booking.com <= 2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

    The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `surbma-bookingcom` shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 13, 2026
    Affected Product
    Surbma | Booking.com Shortcode
    Plugin · surbma-bookingcom-shortcode
    Affected window
    Versions up to 2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.1.1
    Recommended next step
    Update to 2.1.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.1.1
    Update to this version or a newer safe release.
    What to do

    Update to version 2.1.1, or a newer patched version

    Affected versions
    Versions up to 2.1
    Safe / patched versions
    2.1.1
  • Plugin High Patched: Yes CVSS 7.2/10
    BackWPup <= 5.6.6 - Authenticated (Administrator+) Local File Inclusion via 'block_name' Parameter

    The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5.6.6 due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual users permission to handle backups, which may then allow lower-level users to exploit this vulnerability.

    Published
    Apr 13, 2026
    Affected Product
    BackWPup – WordPress Backup & Restore Plugin
    Plugin · backwpup
    Affected window
    Versions up to 5.6.6
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 5.6.7
    Recommended next step
    Update to 5.6.7
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 5.6.6
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.6.7
    Update to this version or a newer safe release.
    What to do

    Update to version 5.6.7, or a newer patched version

    Affected versions
    Versions up to 5.6.6
    Safe / patched versions
    5.6.7
  • Plugin High Patched: Yes CVSS 7.2/10
    Form Maker by 10Web <= 1.15.40 - Unauthenticated Stored Cross-Site Scripting via Matrix Field Text Box

    The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1.15.40. This is due to insufficient input sanitization (`sanitize_text_field` strips tags but not quotes) and missing output escaping when rendering submission data in the admin Submissions view. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript through a form submission that executes in the browser of an administrator who views the submission details.

    Published
    Apr 13, 2026
    Affected Product
    Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
    Plugin · form-maker
    Affected window
    Versions up to 1.15.40
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.15.41
    Recommended next step
    Update to 1.15.41
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.15.40
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.15.41
    Update to this version or a newer safe release.
    What to do

    Update to version 1.15.41, or a newer patched version

    Affected versions
    Versions up to 1.15.40
    Safe / patched versions
    1.15.41
  • Plugin Critical Patched: Yes CVSS 9.1/10
    LearnPress <= 4.3.2.8 - Missing Authorization to Unauthenticated Arbitrary Quiz Answer Deletion

    The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce.

    Published
    Apr 13, 2026
    Affected Product
    LearnPress – WordPress LMS Plugin for Create and Sell Online Courses
    Plugin · learnpress
    Affected window
    Versions up to 4.3.2.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.3.3
    Recommended next step
    Update to 4.3.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.3.2.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.3.3
    Update to this version or a newer safe release.
    What to do

    Update to version 4.3.3, or a newer patched version

    Affected versions
    Versions up to 4.3.2.8
    Safe / patched versions
    4.3.3
  • Plugin High Patched: Yes CVSS 7.5/10
    JetEngine <= 3.8.6.1 - Unauthenticated SQL Injection via '_cct_search' Parameter

    The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into a SQL query string via `sprintf()` without sanitization or use of `$wpdb->prepare()`. WordPress REST API's `wp_unslash()` call on `$_GET` strips the `wp_magic_quotes()` protection, allowing single-quote-based injection. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Custom Content Types module must be enabled with at least one CCT configured with a public REST GET endpoint for exploitation.

    Published
    Apr 13, 2026
    Affected Product
    JetEngine
    Plugin · jet-engine
    Affected window
    Versions up to 3.8.6.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.8.6.2
    Recommended next step
    Update to 3.8.6.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.8.6.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.8.6.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.8.6.2, or a newer patched version

    Affected versions
    Versions up to 3.8.6.1
    Safe / patched versions
    3.8.6.2
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,094 indexed records 14,342 tracked plugins 1,519 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog