1080 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

17 Jul 2025 — The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path. • https://wpscan.com/vulnerability/19f67d6e-4ffe-4126-ac42-fb23c5017a3e •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

11 Jul 2025 — The GeoDirectory WordPress plugin before 2.8.120 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. • https://wpscan.com/vulnerability/27c35255-4963-4d93-85e7-9e7688e5eb2e •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

11 Jul 2025 — The Order Delivery Date WordPress plugin before 12.6.0 discloses arbitrary post title (such as from draft and private posts) via an unauthenticated AJAX action, allowing attackers to retrieve such information • https://wpscan.com/vulnerability/13a87567-2cf7-4bfb-8d63-a8e74950978f •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

10 Jul 2025 — The Hostel WordPress plugin before 1.1.5.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). • https://wpscan.com/vulnerability/ff4d312b-a4d1-40cd-a555-a0a1b46f9959 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

10 Jul 2025 — The Hostel WordPress plugin before 1.1.5.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. • https://wpscan.com/vulnerability/7447c4e1-81b9-4415-b425-27491ff692b2 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

25 Jun 2025 — The ZoomSounds plugin before 6.05 contains a PHP file allowing unauthenticated users to upload an arbitrary file anywhere on the web server. • https://wpscan.com/vulnerability/07259a61-8ba9-4dd0-8d52-cc1df389c0ad •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

13 Jun 2025 — The Sharable Password Protected Posts before version 1.1.1 allows access to password protected posts by providing a secret key in a GET parameter. However, the key is exposed by the REST API. Sharable Password Protected Posts anteriores a la versión 1.1.1 permiten acceder a ellas proporcionando una clave secreta en un parámetro GET. Sin embargo, la clave queda expuesta por la API REST. The Sharable Password Protected Posts plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions ... • https://wpscan.com/vulnerability/dddd6074-1e1f-441f-86f7-316c30262c70 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

10 Jun 2025 — The Axle Demo Importer WordPress plugin through 1.0.3 does not validate files to be uploaded, which could allow authenticated users (author and above) to upload arbitrary files such as PHP on the server The Axle Demo Importer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.0.3. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server ... • https://wpscan.com/vulnerability/673f35ff-e1d5-4099-86e7-8b6e3e410ef8 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

09 Jun 2025 — The WP Lightbox 2 WordPress plugin before 3.0.6.8 does not correctly sanitize the value of the title attribute of links before using them, which may allow malicious users to conduct XSS attacks. The WP Lightbox 2 plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.0.6.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user... • https://wpscan.com/vulnerability/1b50f686-c2e0-4963-95c8-b27137dcc059 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

09 Jun 2025 — The Contact Form Plugin WordPress plugin before 1.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks. The Contact Form Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form fields in all versions up to, and including, 1.1.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and ab... • https://wpscan.com/vulnerability/e1e7f423-f981-413c-a99a-e5927fc1cd0c • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •