Scan WordPress with VulnTitan.
Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.
-
JetFormBuilder <= 3.5.6.2 - Unauthenticated Arbitrary File Read via Media Field
The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment.
PublishedMar 20, 2026Affected ProductJetFormBuilder — Dynamic Blocks Form BuilderPlugin · jetformbuilderAffected if you're usingVersions up to 3.5.6.2Check the full report if you need exact branch-by-branch coverage.Patch availableYesA fixed release is listed for this issue.Fixed in3.5.6.3Update to this version or a newer safe release.What to doUpdate to version 3.5.6.3, or a newer patched version
Affected versionsVersions up to 3.5.6.2Safe / patched versions3.5.6.3 -
Contact Form, Survey, Quiz & Popup Form Builder – ARForms <= 1.7.2 - Unauthenticated Blind Arbitrary Shortcode Execution
The The Contact Form, Survey, Quiz & Popup Form Builder – ARForms plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
PublishedMar 20, 2026Affected ProductContact Form, Survey, Quiz & Popup Form Builder – ARFormsPlugin · arforms-form-builderAffected if you're usingVersions up to 1.7.2Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.7.2Safe / patched versionsNo safe version is published yet. -
Invelity Products Feeds <= 1.2.6 - Cross-Site Request Forgery to Arbitrary File Deletion
The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include path traversal sequences, granted they can trick an admin into clicking a malicious link.
PublishedMar 20, 2026Affected ProductInvelity Product FeedsPlugin · invelity-products-feedsAffected if you're usingVersions up to 1.2.6Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.2.6Safe / patched versionsNo safe version is published yet. -
WP-WebAuthn <= 1.3.4 - Unauthenticated Stored Cross-Site Scripting
The WP-WebAuthn plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting via the `wwa_auth` AJAX endpoint in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes logged by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the plugin's log page, provided that the logging option is enabled in the plugin settings.
PublishedMar 20, 2026Affected ProductWP-WebAuthnPlugin · wp-webauthnAffected if you're usingVersions up to 1.3.4Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.3.4Safe / patched versionsNo safe version is published yet. -
Post Affiliate Pro <= 1.28.0 - Authenticated (Administrator+) Server-Side Request Forgery via 'Post Affiliate Pro URL' Field
The Post Affiliate Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.28.0. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to initiate arbitrary outbound requests from the application and read the returned response content. Successful exploitation was confirmed by receiving and observing response data from an external Collaborator endpoint.
PublishedMar 20, 2026Affected ProductPost Affiliate ProPlugin · postaffiliateproAffected if you're usingVersions up to 1.28.0Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.28.0Safe / patched versionsNo safe version is published yet. -
Survey <= 1.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Settings
The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
PublishedMar 20, 2026Affected ProductSurveyPlugin · surveyAffected if you're usingVersions up to 1.1Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.1Safe / patched versionsNo safe version is published yet. -
Multi Post Carousel by Category <= 1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'slides' Shortcode Attribute
The Multi Post Carousel by Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slides' shortcode attribute in all versions up to, and including, 1.4. This is due to insufficient input sanitization and output escaping on the user-supplied 'slides' parameter in the post_slides_shortcode function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
PublishedMar 20, 2026Affected ProductMulti Post Carousel by CategoryPlugin · multi-post-carouselAffected if you're usingVersions up to 1.4Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.4Safe / patched versionsNo safe version is published yet. -
Mandatory Field <= 1.6.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via Settings Fields
The Mandatory Field plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
PublishedMar 20, 2026Affected ProductMandatory FieldPlugin · mandatory-fieldsAffected if you're usingVersions up to 1.6.8Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.6.8Safe / patched versionsNo safe version is published yet. -
Logo Slider <= 4.9.0 - Authenticated (Author+) Stored Cross-Site Scripting via 'logo-slider' Shortcode
The Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt text in all versions up to, and including, 4.9.0 due to insufficient input sanitization and output escaping in the 'logo-slider' shortcode. This makes it possible for authenticated attackers, with author level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
PublishedMar 20, 2026Affected ProductLogo Slider – Logo Carousel, Logo Showcase & Client Logo Slider PluginPlugin · logo-slider-wpAffected if you're usingVersions up to 4.9.0Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 4.9.0Safe / patched versionsNo safe version is published yet. -
WPFAQBlock– FAQ & Accordion Plugin For Gutenberg <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'class' Shortcode Attribute
The WPFAQBlock– FAQ & Accordion Plugin For Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter of the 'wpfaqblock' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
PublishedMar 20, 2026Affected ProductWPFAQBlock– FAQ & Accordion Plugin For GutenbergPlugin · wpfaqblockAffected if you're usingVersions up to 1.1Check the full report if you need exact branch-by-branch coverage.Patch availableNoNo fixed release is listed in the feed yet.Fixed inNot publishedWatch for a vendor release before treating the issue as fixed.What to doNo known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected versionsVersions up to 1.1Safe / patched versionsNo safe version is published yet.
Browse high-interest plugin and theme vulnerability hubs.
Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.