cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-13222,https://securityvulnerability.io/vulnerability/CVE-2024-13222,Reflected Cross-Site Scripting in User Messages Plugin for WordPress,"The User Messages plugin for WordPress up to version 1.2.4 is susceptible to a Reflected Cross-Site Scripting vulnerability. This issue arises from the failure to properly sanitize and escape user input before outputting it on web pages. As a result, an attacker can exploit this vulnerability to execute arbitrary scripts in the context of high privilege users, such as administrators, potentially leading to unauthorized access or manipulation of web content.",WordPress,User Messages,,,0.01,false,,false,false,true,true,false,false,2025-01-31T06:00:15.995Z,0 CVE-2025-0308,https://securityvulnerability.io/vulnerability/CVE-2025-0308,SQL Injection Vulnerability in Ultimate Member Plugin for WordPress,"The Ultimate Member plugin for WordPress, versions up to and including 2.9.1, is susceptible to a time-based SQL injection vulnerability. This issue arises due to inadequate escaping of user-supplied input in search parameters, allowing unauthorized attackers to inject additional SQL queries into existing ones. Successful exploitation can lead to the unauthorized extraction of sensitive data from the database, posing a significant risk to user information and overall site security.",Wordpress,"Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin",7.5,HIGH,0.0008699999889358878,false,,false,false,false,false,false,false,2025-01-18T05:33:50.432Z,0 CVE-2025-0318,https://securityvulnerability.io/vulnerability/CVE-2025-0318,Information Exposure in Ultimate Member Plugin for WordPress,"The Ultimate Member plugin, which facilitates user profile management and membership capabilities on WordPress, is susceptible to a vulnerability that allows unauthorized attackers to extract sensitive information from the wp_usermeta table. This vulnerability arises from misconfigured error messages that leak information through their responses, potentially compromising user data. All versions up to and including 2.9.1 are affected, underscoring the importance of timely updates to safeguard against data breaches.",Wordpress,"Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin",5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,false,false,false,2025-01-18T05:33:49.324Z,0 CVE-2024-12637,https://securityvulnerability.io/vulnerability/CVE-2024-12637,Sensitive Information Exposure in Moving Users Plugin for WordPress,"The Moving Users plugin for WordPress is exposed to a vulnerability that allows the export functionality to store JSON files in predictable locations with easily guessable names. This may enable attackers without authentication to access sensitive user information, such as email addresses, hashed passwords, and IP addresses. Users are advised to review their security measures and update their plugins to secure their data.",Wordpress,Moving Users,5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,false,false,false,2025-01-17T07:01:28.253Z,0 CVE-2024-10789,https://securityvulnerability.io/vulnerability/CVE-2024-10789,Cross-Site Request Forgery in WP User Profile Avatar Plugin for WordPress,"The WP User Profile Avatar plugin for WordPress is susceptible to Cross-Site Request Forgery (CSRF) due to inadequate nonce validation in the wpupa_user_admin() function. This vulnerability allows unauthorized attackers to manipulate plugin settings through crafted requests, potentially deceiving site administrators into unknowingly executing actions that compromise site integrity.",Wordpress,WP User Profile Avatar,4.3,MEDIUM,0.0004600000102072954,false,,false,false,false,false,false,false,2025-01-16T03:27:22.549Z,0 CVE-2024-12738,https://securityvulnerability.io/vulnerability/CVE-2024-12738,Stored Cross-Site Scripting in User Profile Builder Plugin for WordPress,"The User Profile Builder plugin for WordPress is susceptible to stored cross-site scripting due to insufficient input sanitization and output escaping. This vulnerability allows unauthenticated attackers to inject malicious scripts through user meta parameters. When a user interacts with an affected page, the injected scripts can execute, leading to potential session hijacking and other malicious activities. This issue affects all versions up to and including 3.12.9, emphasizing the need for immediate updates and improved security practices.",Wordpress,"User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor",6.1,MEDIUM,0.0005200000014156103,false,,false,false,false,false,false,false,2025-01-07T12:43:40.348Z,0 CVE-2024-11977,https://securityvulnerability.io/vulnerability/CVE-2024-11977,Arbitrary Shortcode Execution Vulnerability in kk Star Ratings Plugin for WordPress,"CVE-2024-11977 is a high-risk vulnerability in the kk Star Ratings plugin for WordPress that allows unauthenticated attackers to execute arbitrary shortcodes. This vulnerability arises from a lack of proper value validation in the plugin's handling of executed actions, which affects all versions up to and including 5.4.10. When exploited, this could enable attackers to manipulate website content or perform unauthorized actions, putting user data at risk. Website owners using this plugin should update immediately to secured versions to prevent potential exploits.",Wordpress,Kk Star Ratings – Rate Post & Collect User Feedbacks,7.3,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-12-21T05:31:02.179Z,0 CVE-2024-12293,https://securityvulnerability.io/vulnerability/CVE-2024-12293,Cross-Site Request Forgery Vulnerability in User Role Editor Plugin for WordPress,"The User Role Editor plugin for WordPress is exposed to a Cross-Site Request Forgery (CSRF) vulnerability due to inadequate nonce validation in the update_roles() function. This flaw affects all versions up to and including 4.64.3 and allows unauthenticated attackers to manipulate user roles. By tricking administrators into clicking a malicious link, attackers can perform unauthorized actions, including escalating privileges to that of an administrator. Website owners should upgrade to patched versions and implement security measures to mitigate this risk.",Wordpress,User Role Editor,8.8,HIGH,0.000539999979082495,false,,false,false,false,,false,false,2024-12-17T08:22:46.918Z,0 CVE-2024-10518,https://securityvulnerability.io/vulnerability/CVE-2024-10518,Stored Cross-Site Scripting Vulnerability in WordPress Plugins Affecting Membership Management,"The Paid Membership Plugin for WordPress versions prior to 4.15.15 contains a critical security flaw that fails to properly sanitize and escape certain Membership Plan settings. This oversight can enable high-privileged users, such as administrators, to execute Stored Cross-Site Scripting (XSS) attacks, even in environments where the unfiltered_html capability is restricted, such as multisite setups. This vulnerability can lead to significant security risks, including unauthorized access and data manipulation within WordPress sites.",Wordpress,"Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content",,,0.0004299999854993075,false,,false,false,true,true,false,false,2024-12-12T06:00:17.717Z,0 CVE-2024-10517,https://securityvulnerability.io/vulnerability/CVE-2024-10517,Stored Cross-Site Scripting Vulnerability in Paid Membership Plugin for WordPress,"The Paid Membership Plugin for WordPress before version 4.15.15 contains a vulnerability that fails to properly sanitize and escape certain fields within its Drag & Drop Builder. This oversight can enable high-privileged users, such as administrators, to execute Stored Cross-Site Scripting (XSS) attacks, even in configurations where the unfiltered_html capability is restricted, such as multisite setups. Exploiting this vulnerability could compromise the security of the entire site, making it critical for users to update to the latest version to protect against potential attacks.",Wordpress,"Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content",,,0.0004299999854993075,false,,false,false,true,true,false,false,2024-12-12T06:00:17.200Z,0 CVE-2024-11351,https://securityvulnerability.io/vulnerability/CVE-2024-11351,Sensitive Information Exposure in WordPress Restrict Plugin,"The Restrict plugin for WordPress, which manages membership and content access restrictions, is susceptible to a vulnerability that enables unauthorized individuals to access sensitive information. This occurs through the WordPress core search feature, allowing unauthenticated users to extract data from posts typically restricted to higher-level roles, such as administrators. Users of the plugin should take immediate action to secure their installations and protect sensitive information from potential exposure.",Wordpress,"Restrict – Membership, Site, Content And User Access Restrictions For WordPress",5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-12-11T12:24:18.746Z,0 CVE-2024-11008,https://securityvulnerability.io/vulnerability/CVE-2024-11008,Unauthenticated Attackers Can Extract Sensitive Data from Restricted Posts via WordPress Core Search,"The Membership & User Role Editor Plugin for WordPress exhibits a vulnerability that permits unauthenticated attackers to exploit the WordPress core search feature. This weakness enables the extraction of sensitive information from posts that should be restricted to users with higher-level roles, such as administrators. As a consequence, the privacy and security of sensitive data may be compromised, posing significant risks to website owners and their users.",Wordpress,Members – Membership & User Role Editor Plugin,5.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-12-11T10:57:29.270Z,0 CVE-2024-11374,https://securityvulnerability.io/vulnerability/CVE-2024-11374,Unauthenticated Cross-Site Scripting Vulnerability in TWChat Plugin,"The TWChat – Send or receive messages from users plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.4. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",Wordpress,Twchat – Send Or Receive Messages From Users,6.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-12-07T09:27:03.991Z,0 CVE-2024-11436,https://securityvulnerability.io/vulnerability/CVE-2024-11436,Reflected Cross-Site Scripting Vulnerability in Drag & Drop Builder Plugin,"The Drag & Drop Builder, Human Face Detector, Pre-built Templates, Spam Protection, User Email Notifications & more! plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.4.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",Wordpress,"Drag & Drop Builder, Human Face Detector, Pre-built Templates, Spam Protection, User Email Notifications & More!",6.1,MEDIUM,0.0004600000102072954,false,,false,false,false,,false,false,2024-12-07T02:15:00.000Z,0 CVE-2024-10681,https://securityvulnerability.io/vulnerability/CVE-2024-10681,Unsafe Shortcode Execution Vulnerability,"The ARMember – Membership Plugin for WordPress has a significant vulnerability that allows malicious actors to execute arbitrary shortcodes. This issue arises from the plugin's failure to properly validate input values before processing the do_shortcode function. As a result, authenticated attackers with subscriber-level access or higher can exploit this flaw, potentially leading to unauthorized actions within the website. It's crucial for users of ARMember to address this vulnerability promptly to safeguard their sites against possible manipulation and misuse.",Wordpress,"Armember – Membership Plugin, Content Restriction, Member Levels, User Profile & User Signup",6.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,2024-12-06T09:23:00.490Z,0 CVE-2024-11453,https://securityvulnerability.io/vulnerability/CVE-2024-11453,Stored Cross-Site Scripting Vulnerability in WordPress Pinterest Plugin,"The WordPress Pinterest Plugin – Make a Popup, User Profile, Masonry and Gallery Layout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gs_pin_widget' shortcode in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",Wordpress,"WordPress Pinterest Plugin – Make A Popup, User Profile, Masonry And Gallery Layout",6.4,MEDIUM,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-03T07:34:54.323Z,0 CVE-2024-11083,https://securityvulnerability.io/vulnerability/CVE-2024-11083,Unauthenticated Attackers Can Extract Sensitive Data via WordPress Core Search,"The ProfilePress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.15.18 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.",Wordpress,"Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – Profilepress",5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-27T05:31:54.074Z,0 CVE-2024-10788,https://securityvulnerability.io/vulnerability/CVE-2024-10788,Stored Cross-Site Scripting Vulnerability in Activity Log Plugin,"The Activity Log – Monitor & Record User Changes plugin for WordPress is susceptible to a Stored Cross-Site Scripting issue stemming from inadequate input sanitization and output escaping. This vulnerability affects all versions up to and including 2.11.1. Unauthenticated attackers can exploit this flaw to inject arbitrary web scripts into pages, which will execute when an administrative user accesses an affected page. The lack of proper validation allows malicious code to be transmitted through event parameters, posing significant risks to website security and integrity.",Wordpress,Activity Log – Monitor & Record User Changes,7.2,HIGH,0.0005200000014156103,false,,false,false,false,,false,false,2024-11-21T05:33:50.411Z,0 CVE-2024-10528,https://securityvulnerability.io/vulnerability/CVE-2024-10528,Unauthorized Profile Picture Updates in The Ultimate Member Plugin,"The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to unauthorized profile picture updates due to a missing capability check on the wp_ajax_um_resize_image() and ajax_resize_image() functions in all versions up to, and including, 2.8.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the profile pictures of other users.",Wordpress,"Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin",4.3,MEDIUM,0.0006799999973736703,false,,false,false,false,,false,false,2024-11-21T05:33:48.663Z,0 CVE-2024-11197,https://securityvulnerability.io/vulnerability/CVE-2024-11197,Vulnerability in Lock User Account Plugin Allows Authenticated Attackers to Bypass Account Lock,"The Lock User Account plugin for WordPress is vulnerable to user lock bypass in all versions up to, and including, 1.0.5. This is due to permitting application password logins when user accounts are locked. This makes it possible for authenticated attackers, with existing application passwords, to interact with the vulnerable site via an API such as XML-RPC or REST despite their account being locked.",Wordpress,Lock User Account,4.2,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-11-21T02:06:34.525Z,0 CVE-2024-10900,https://securityvulnerability.io/vulnerability/CVE-2024-10900,Unauthorized Modification of User Meta Data in ProfileGrid,"The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress has a vulnerability due to a missing capability check in the pm_remove_file_attachment() function. This issue, present in all versions up to and including 5.9.3.6, allows authenticated attackers with subscriber-level access or higher to delete arbitrary user metadata. This could potentially lead to severe disruptions, including the denial of access for administrators to their own sites, posing significant security concerns for WordPress users reliant on this plugin.",Wordpress,"Profilegrid – User Profiles, Groups And Communities",8.1,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2024-11-20T06:42:54.323Z,0 CVE-2024-9887,https://securityvulnerability.io/vulnerability/CVE-2024-9887,Time-Based SQL Injection Vulnerability in WP as SAML IDP,"The Login using WordPress Users (WP as SAML IDP) plugin is exposed to a time-based SQL injection vulnerability through the ‘id’ parameter. This issue arises from insufficient escaping of user-supplied parameters and lack of proper SQL query preparation. Authenticated attackers with Administrator-level access or higher can exploit this vulnerability to inject additional SQL queries into existing queries, enabling unauthorized access to sensitive database information.",Wordpress,Login Using WordPress Users ( WP As Saml Idp ),7.2,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2024-11-16T09:36:34.031Z,0 CVE-2024-11150,https://securityvulnerability.io/vulnerability/CVE-2024-11150,Arbitrary File Deletion Vulnerability in WordPress User Extra Fields Plugin,"The WordPress User Extra Fields plugin is affected by a vulnerability that allows unauthenticated attackers to delete arbitrary files from a server due to inadequate validation of file paths in the delete_tmp_uploaded_file() function. This flaw exists in all versions up to and including 16.6. The ability to delete critical files, such as wp-config.php, could enable remote code execution, substantially compromising server security and integrity.",Wordpress,WordPress User Extra Fields,9.8,CRITICAL,0.000910000002477318,false,,false,false,false,,false,false,2024-11-13T04:29:07.068Z,0 CVE-2024-10800,https://securityvulnerability.io/vulnerability/CVE-2024-10800,Privilege Escalation Vulnerability in WordPress User Extra Fields Plugin,"The WordPress User Extra Fields plugin, developed by CodeCanyon, is susceptible to a privilege escalation flaw due to a lack of capability checks in the ajax_save_fields() function. This vulnerability affects all versions up to and including 16.6. Authenticated users with subscriber-level access and higher can exploit this vulnerability to add custom fields. Subsequently, they can utilize the check_and_overwrite_wp_or_woocommerce_fields function to modify the wp_capabilities field, effectively elevating their privileges to that of an administrator. This poses significant risks to website security, as it allows unauthorized access to critical functionalities and controls.",Wordpress,WordPress User Extra Fields,8.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-11-13T04:29:06.399Z,0 CVE-2024-10508,https://securityvulnerability.io/vulnerability/CVE-2024-10508,Unauthenticated Attackers Can Escalate Privileges via Plugin Flaw,"The RegistrationMagic User Registration Plugin for WordPress is susceptible to a serious vulnerability that allows unauthenticated attackers to escalate privileges via account takeover. This issue stems from the plugin's inadequate validation of password reset tokens prior to allowing updates to user passwords. As a result, attackers can reset passwords for arbitrary users, including those with administrative privileges, and gain unauthorized access to sensitive accounts. The vulnerability exists in all versions up to and including 6.0.2.6, necessitating immediate attention and patching to mitigate risks associated with potential exploitation.",Wordpress,Registrationmagic – User Registration Plugin With Custom Registration Forms,9.8,CRITICAL,0.00044999999227002263,false,,false,false,false,,false,false,2024-11-09T07:35:07.908Z,0