Vulnerabilities

Stay ahead of the curve with our comprehensive coverage of WordPress plugin and theme vulnerabilities. Don’t let outdated software put your website at risk.

<

Arbitrary File Upload vulnerability in WordPress Forminator Plugin

August 29, 2023

An Arbitrary File Upload vulnerability has been identified in the WordPress Forminator Plugin. This vulnerability allows an attacker to upload any type

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Happy Elementor Addons Pro Plugin

August 29, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Happy Elementor Addons Pro Plugin. This vulnerability allows an attacker to

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Bridge Core Plugin

August 29, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Bridge Core Plugin. This vulnerability allows an attacker to inject malicious

Read more

Arbitrary File Upload vulnerability in WordPress Olive One Click Demo Import Plugin

August 28, 2023

An Arbitrary File Upload vulnerability has been identified in the WordPress Olive One Click Demo Import Plugin. This vulnerability allows an attacker

Read more

Broken Access Control vulnerability in WordPress Premmerce User Roles Plugin

August 24, 2023

A Broken Access Control vulnerability has been identified in the WordPress Premmerce User Roles Plugin. This vulnerability allows an unprivileged user to

Read more

Arbitrary Code Execution vulnerability in WordPress Kanban Boards for WordPress Plugin

August 17, 2023

An Arbitrary Code Execution vulnerability has been identified in the WordPress Kanban Boards for WordPress Plugin. This vulnerability allows an attacker to

Read more

SQL Injection vulnerability in WordPress Demon image annotation Plugin

August 10, 2023

An SQL Injection vulnerability has been identified in the WordPress Demon image annotation Plugin. This vulnerability allows an attacker to inject malicious

Read more

Cross-Site Scripting (XSS) vulnerability in Online Booking & Scheduling Calendar Plugin

August 10, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Online Booking & Scheduling Calendar for WordPress by vcita Plugin. This

Read more

Remote File Inclusion vulnerability in WordPress Canto Plugin

August 9, 2023

A Remote File Inclusion (RFI) vulnerability has been identified in the WordPress Canto Plugin. This vulnerability allows an attacker to get a

Read more

Cross-Site Scripting (XSS) vulnerability in WordPress Leyka Plugin

August 7, 2023

A high-severity vulnerability has been identified in the WordPress Leyka Plugin. This vulnerability allows an attacker to inject malicious scripts into the

Read more

PHP Object Injection vulnerability in WordPress Themesflat Addons For Elementor Plugin

August 7, 2023

A PHP Object Injection vulnerability has been identified in the WordPress Themesflat Addons For Elementor Plugin. This vulnerability allows an attacker to

Read more

Medium-severity Cross-Site Scripting (XSS) vulnerability in WordPress Simple Share Follow Button plugin

August 3, 2023

A Cross-Site Scripting (XSS) vulnerability has been identified in the WordPress Simple Share Follow Button plugin. This vulnerability could allow an attacker

Read more

High-severity Sensitive Data Exposure vulnerability in WordPress WP Ultimate CSV Importer plugin

August 3, 2023

A Sensitive Data Exposure vulnerability has been identified in the WordPress WP Ultimate CSV Importer plugin. This vulnerability could allow an attacker

Read more

Remote Code Execution (RCE) Vulnerability in JetElements For Elementor Plugin

August 3, 2023

WordPress security is of utmost importance, and we want to bring attention to a critical Remote Code Execution (RCE) vulnerability discovered in

Read more

High-severity Remote Code Execution (RCE) vulnerability in WordPress WP Ultimate CSV Importer plugin

August 3, 2023

A Remote Code Execution (RCE) vulnerability has been identified in the WordPress WP Ultimate CSV Importer plugin. This vulnerability could allow an

Read more