Vulnerabilities

Stay ahead of the curve with our comprehensive coverage of WordPress plugin and theme vulnerabilities. Don’t let outdated software put your website at risk.

<

Privilege Escalation vulnerability in WordPress ProfilePress Plugin

September 12, 2023

A Privilege Escalation vulnerability has been identified in the WordPress ProfilePress Plugin. This vulnerability could allow a malicious actor with low privileges

Read more

Privilege Escalation vulnerability in WordPress MasterStudy LMS Plugin

September 12, 2023

A high-severity vulnerability has been identified in the WordPress MasterStudy LMS Plugin. This vulnerability could allow a malicious actor with low privileges

Read more

SQL Injection vulnerability in WordPress Slimstat Analytics Plugin

September 11, 2023

A SQL Injection vulnerability has been identified in the WordPress Slimstat Analytics plugin. This vulnerability could allow a malicious actor to directly

Read more

Arbitrary File Upload vulnerability in WordPress My Account Page Editor for WooCommerce Plugin

September 8, 2023

An Arbitrary File Upload vulnerability has been identified in the WordPress My Account Page Editor for WooCommerce Plugin. This vulnerability allows an

Read more

Arbitrary File Upload vulnerability in WordPress Form Maker by 10Web Plugin

September 7, 2023

An Arbitrary File Upload vulnerability has been identified in the WordPress Form Maker by 10Web Plugin. This vulnerability allows an attacker to

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Locatoraid Store Locator Plugin

September 6, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Locatoraid Store Locator Plugin. This vulnerability could allow an attacker to

Read more

Remote Code Execution (RCE) vulnerability in WordPress Media Library Assistant Plugin

September 6, 2023

A Remote Code Execution (RCE) vulnerability has been identified in the WordPress Media Library Assistant Plugin. This vulnerability could allow an attacker

Read more

Privilege Escalation vulnerability in WordPress All in One B2B for WooCommerce Plugin

September 6, 2023

A Privilege Escalation vulnerability has been identified in the WordPress All in One B2B for WooCommerce Plugin. This vulnerability could allow a

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Simple Membership Plugin

September 6, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Simple Membership Plugin. This vulnerability could allow an attacker to inject

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Click To Tweet Plugin

September 5, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Click To Tweet Plugin. This vulnerability could allow an attacker to

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress AcyMailing SMTP Newsletter Plugin

September 5, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress AcyMailing SMTP Newsletter Plugin. This vulnerability could allow an attacker to

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Stagtools Plugin

September 5, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Stagtools Plugin. This vulnerability could allow an attacker to inject malicious

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Poll Maker Plugin

September 5, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Poll Maker Plugin. This vulnerability could allow an attacker to inject

Read more

Remote Code Execution (RCE) vulnerability in WordPress RSVPMarker Plugin

September 5, 2023

A Remote Code Execution (RCE) vulnerability has been identified in the WordPress RSVPMarker plugin. This vulnerability could allow a malicious actor to

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Restrict Plugin

September 5, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Restrict Plugin. This vulnerability could allow an attacker to inject malicious

Read more