Tag
Contact Form 7 WordPress Plugin Uncontrolled Resource Consumption Vulnerability
2 rules 1 TTP 1 CVEThe Contact Form 7 WordPress plugin through version 2.6.7 is vulnerable to uncontrolled resource consumption, allowing unauthenticated attackers to exhaust server memory and crash the PHP process by supplying an arbitrarily large integer value to the REST API endpoint, leading to unbounded loop execution.
WordPress Easy PayPal Events & Tickets Plugin Information Disclosure Vulnerability
2 rules 1 TTP 1 CVEAn information disclosure vulnerability in the Easy PayPal Events & Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.
WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVE 1 IOCAn unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.
NEX-Forms WordPress Plugin Vulnerable to Stored Cross-Site Scripting (CVE-2026-5063)
2 rules 1 TTP 1 CVEThe NEX-Forms WordPress plugin is vulnerable to stored XSS via POST parameter key names, allowing unauthenticated attackers to inject arbitrary web scripts.
WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion
2 rules 1 TTP 1 CVEThe WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.
Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability
2 rules 1 TTP 1 CVEThe Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.
Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
2 rules 3 TTPs 1 CVEThe Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)
2 rules 1 TTP 1 CVEThe Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.
Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)
2 rules 1 TTP 1 CVEA time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.
WordPress Widget Options Plugin Remote Code Execution Vulnerability (CVE-2026-2052)
2 rules 1 TTP 1 CVEThe Widget Options plugin for WordPress is vulnerable to Remote Code Execution (CVE-2026-2052) due to insufficient input sanitization in the Display Logic feature, allowing authenticated attackers with Contributor-level access and above to execute arbitrary code on the server.
PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)
2 rules 1 TTP 1 CVEThe PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.
Gravity Forms Plugin Stored XSS Vulnerability (CVE-2026-5113)
2 rules 2 TTPs 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to stored cross-site scripting (XSS) via Consent field hidden inputs, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the entries list page.
WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation
2 rules 1 TTP 1 CVEThe WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.
WordPress User Verification Plugin Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEThe User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in versions up to 2.0.46 due to a loose PHP comparison, allowing unauthenticated attackers to log in as any verified user by submitting a 'true' OTP value.
WordPress Import and Export Users Plugin Privilege Escalation Vulnerability
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.
WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability
2 rules 1 TTP 1 CVEThe User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.
WP Editor Plugin CSRF Vulnerability
2 rules 1 TTP 1 CVEThe WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.
WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)
2 rules 1 TTP 1 CVEThe Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.
BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion
2 rules 1 TTP 1 CVECVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.
WordPress Create DB Tables Plugin Authorization Bypass Vulnerability (CVE-2026-4119)
2 rules 3 TTPs 1 CVEThe Create DB Tables plugin for WordPress versions 1.2.1 and earlier is vulnerable to an authorization bypass, allowing authenticated users to create and delete database tables without proper checks, potentially leading to complete site destruction.
WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)
2 rules 1 TTP 1 CVEThe HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.
MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)
2 rules 1 TTP 1 CVEA deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.
Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 3 TTPs 1 CVEThe Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.
WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability
2 rules 1 TTP 1 CVEThe WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.
Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)
2 rules 1 TTP 1 CVEThe Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.
Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)
2 rules 1 TTP 1 CVE 1 IOCA missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.
AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)
2 rules 1 TTP 1 CVEThe AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.
Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.
Riaxe Product Customizer WordPress Plugin Privilege Escalation Vulnerability (CVE-2026-3596)
2 rules 2 TTPs 1 CVEThe Riaxe Product Customizer plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to update arbitrary WordPress options via a publicly accessible AJAX endpoint and escalate privileges to administrator.
WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)
2 rules 1 TTP 1 CVE 1 IOCAn SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.
Smart Post Show WordPress Plugin PHP Object Injection Vulnerability
2 rules 1 TTP 1 CVEThe Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.
LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)
2 rules 1 TTP 1 CVEThe LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.
Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)
2 rules 1 TTP 1 CVE 1 IOCCVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.
CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)
2 rules 1 TTP 1 CVECVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.
wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)
2 rules 1 TTP 1 CVEThe wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.
BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)
2 rules 1 TTP 1 CVEThe BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.
Zootemplate Cerato Theme Reflected XSS Vulnerability (CVE-2025-58920)
2 rules 1 TTP 1 CVE 1 IOCA reflected cross-site scripting (XSS) vulnerability exists in the Zootemplate Cerato WordPress theme (versions n/a through 2.2.18) due to improper neutralization of user-supplied input, potentially allowing attackers to execute arbitrary JavaScript in a user's browser.
Gravity SMTP Plugin Missing Authorization Vulnerability (CVE-2026-4162)
2 rules 1 TTP 1 CVEThe Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization, allowing authenticated attackers with subscriber-level access or higher to uninstall/deactivate the plugin and delete plugin options, and is also exploitable via Cross-Site Request Forgery.
Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)
2 rules 2 TTPs 1 CVEThe Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.
Smart Slider 3 Pro Compromised Update Leads to Remote Code Execution
3 rules 9 TTPs 1 CVESmart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system allowing unauthenticated remote code execution and system takeover.
WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)
2 rules 1 TTP 1 CVE 2 IOCsThe WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.
WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)
2 rules 1 TTP 1 CVEThe WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.
WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps
2 rules 2 TTPs 1 CVEThe Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)
3 rules 1 TTP 1 CVEThe Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.
Everest Forms WordPress Plugin PHP Object Injection Vulnerability
2 rules 2 TTPs 1 CVEThe Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.
CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)
2 rules 2 TTPs 1 CVEA cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon & Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.
Amelia WordPress Plugin IDOR Vulnerability CVE-2026-5465
2 rules 1 TTP 1 CVEThe Amelia WordPress plugin is vulnerable to an insecure direct object reference, allowing authenticated attackers with Provider-level access or higher to escalate privileges and gain persistence by taking over any WordPress account, including Administrator by manipulating the `externalId` field.
Ninja Forms File Upload Plugin Vulnerability Leads to RCE
2 rules 2 TTPs 1 CVEThe Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
Media Library Assistant WordPress Plugin SQL Injection Vulnerability
2 rules 1 TTP 1 CVEThe Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.
WordPress Widgets for Social Photo Feed Plugin Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) via the 'feed_data' parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute when a user accesses the injected page.
ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability
2 rules 1 TTP 1 CVEThe ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.
Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)
2 rules 1 TTP 1 CVEThe Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.
WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)
2 rules 1 TTP 1 CVEThe Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.
MW WP Form WordPress Plugin Arbitrary File Move Vulnerability (CVE-2026-4347)
2 rules 2 TTPs 1 CVEThe MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation, allowing unauthenticated attackers to move arbitrary files on the server, potentially leading to remote code execution.
Query Monitor WordPress Plugin Vulnerable to Reflected XSS (CVE-2026-4267)
2 rules 1 TTP 1 CVEThe Query Monitor WordPress plugin is vulnerable to reflected cross-site scripting (XSS) due to insufficient input sanitization and output escaping of the '$_SERVER['REQUEST_URI']' parameter, allowing unauthenticated attackers to inject arbitrary web scripts.
Contact Form by Supsystic WordPress Plugin SSTI Vulnerability (CVE-2026-4257)
2 rules 1 TTP 1 CVEThe Contact Form by Supsystic WordPress plugin is vulnerable to Server-Side Template Injection (SSTI) via the `cfsPreFill` parameter, leading to unauthenticated Remote Code Execution (RCE).
Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)
2 rules 1 TTPThe Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.
Fluent Booking WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.
Blackhole for Bad Bots WordPress Plugin Stored XSS Vulnerability
2 rules 1 TTPThe Blackhole for Bad Bots WordPress plugin through version 3.8 is vulnerable to stored cross-site scripting (XSS) via the User-Agent HTTP header, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the plugin's admin page.
Masteriyo LMS WordPress Plugin Privilege Escalation Vulnerability
2 rules 1 TTPThe Masteriyo LMS plugin for WordPress is vulnerable to privilege escalation, allowing authenticated users with student-level access or higher to gain administrator privileges by manipulating the 'InstructorsController::prepare_object_for_database' function.
WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)
2 rules 3 TTPsThe WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.
WP Job Portal Plugin SQL Injection Vulnerability
2 rules 1 TTPThe WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.
ReviewX WordPress Plugin Arbitrary Method Call Vulnerability
2 rules 1 TTPThe ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.
Contest Gallery WordPress Plugin Authentication Bypass Vulnerability (CVE-2026-4021)
2 rules 3 TTPs 1 IOCCVE-2026-4021 describes an authentication bypass vulnerability in the Contest Gallery plugin for WordPress, allowing unauthenticated attackers to gain admin access by manipulating the user activation key and using an AJAX login endpoint.
WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)
2 rules 1 TTPThe WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.
Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)
3 rules 1 TTP 1 CVECVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.
Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)
2 rules 1 TTP 1 CVEThe Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.
Royal Elementor Addons Plugin SSRF Vulnerability
2 rules 1 TTP 1 CVEThe Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.
WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)
2 rules 1 TTP 1 CVEThe Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.
WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)
2 rules 1 TTP 1 CVEAn unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.
WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106
2 rules 1 TTP 1 CVEHighland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.
WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)
2 rules 1 TTP 1 CVECVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to unauthenticated stored cross-site scripting (XSS) in versions up to 2.10.0, allowing attackers to inject arbitrary JavaScript code into the product name field within repeater fields, which executes when an administrator views the affected entry.
ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)
2 rules 1 TTP 1 CVEA time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.
Gravity Forms Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 CVEThe Gravity Forms plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.10.0, allowing unauthenticated attackers to inject arbitrary web scripts via form submissions that execute when an administrator views the entry detail page.
ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution
2 rules 4 TTPs 1 CVEThe ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.
Brizy WordPress Plugin Unauthenticated Stored XSS Vulnerability
2 rules 1 TTP 1 CVEThe Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting (XSS) in versions up to and including 2.8.11, allowing unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form Leads page due to missing nonce verification and improper handling of file upload fields.