Stay Protected with Vulnerability Alerts

    Updated automatically every hour

    Recent WordPress Vulnerabilities

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    MEDIUM (6.0)
    Plugin

    Stored Cross-Site Scripting in EMC Calendly Plugin via Shortcode

    Published Date: 4/19/2026

    The EMC – Easily Embed Calendly Scheduling Features plugin for WordPress is vulnerable to stored XSS due to inadequate input sanitization and output escaping on shortcode attributes. This flaw affects all versions up to 4.4 and allows contributors and higher roles to insert malicious scripts into pages.

    MEDIUM (6.3)
    Plugin

    Stored Cross-Site Scripting in Content Blocks Plugin

    Published Date: 4/18/2026

    The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) due to improper input sanitization and output escaping in its content_block shortcode. This vulnerability affects versions up to, and including, 3.3.9, allowing authenticated users with contributor-level access or higher to inject malicious scripts.

    MEDIUM (6.3)
    Plugin

    Stored Cross-Site Scripting Vulnerability in Youzify Plugin

    Published Date: 4/18/2026

    The Youzify plugin for WordPress contains a Stored Cross-Site Scripting (XSS) vulnerability via the 'checkin_place_id' parameter, affecting versions up to 1.3.6. This flaw allows authenticated users with Subscriber-level access or higher to inject malicious scripts that automatically execute when a page containing the script is accessed.

    MEDIUM (5.4)
    Plugin

    Vulnerability in Hostel Plugin Allows Reflected XSS via 'shortcode_id' Parameter

    Published Date: 4/18/2026

    The Hostel plugin up to version 1.1.6 is susceptible to Reflected Cross-Site Scripting (XSS) due to inadequate input sanitization and output escaping. This flaw allows attackers to execute malicious scripts in the browser of users who interact with crafted links.

    MEDIUM (5.9)
    Plugin

    Unauthorized Data Modification in Post Grid Gutenberg Blocks for WordPress Plugin

    Published Date: 4/16/2026

    The PostX plugin for WordPress, up to version 5.0.5, is vulnerable to unauthorized modification of the 'share_count' post meta due to a missing capability check in the 'ultp_shareCount_callback()' function. This allows unauthenticated users to alter this data for any post, potentially leading to misleading statistics or exploitation of additional system weaknesses.

    MEDIUM (5.8)
    Plugin

    Livemesh Addons for Elementor Unauthorized Data Modification and Stored XSS Vulnerability

    Published Date: 4/16/2026

    The Livemesh Addons for Elementor plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting (XSS) in all versions up to and including 9.0. This issue arises from insufficient authorization checks and inadequate output escaping, allowing authenticated users with sufficient privileges to inject malicious scripts.

    MEDIUM (5.3)
    Plugin

    Livemesh Addons for Elementor Local File Inclusion Vulnerability

    Published Date: 4/16/2026

    The Livemesh Addons for Elementor plugin up to version 9.0 is vulnerable to Local File Inclusion (LFI). This vulnerability allows authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server through insufficient sanitization of input parameters.

    MEDIUM (6.4)
    Plugin

    Cross-Site Request Forgery in WooBeWoo Product Pricing Table Plugin

    Published Date: 4/15/2026

    The WooBeWoo Product Pricing Table plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) due to insufficient nonce validation in certain functions. This allows attackers to conduct unauthorized actions such as injecting web scripts or deleting pricing tables by tricking administrators into interacting with malicious requests.

    MEDIUM (6.7)
    Plugin

    Improper Input Validation in MetForm Pro Plugin Allows Payment Manipulation

    Published Date: 4/15/2026

    The MetForm Pro plugin for WordPress suffers from improper input validation in versions up to and including 3.9.7, enabling attackers to manipulate payments. The issue arises from the plugin's failure to validate user-submitted calculation field values against configured form prices in its payment integrations.

    MEDIUM (5.2)
    Theme

    Arbitrary File Upload Vulnerability in WebStack Theme

    Published Date: 4/15/2026

    The WebStack theme for WordPress is susceptible to arbitrary file uploads due to insufficient file type validation. This vulnerability affects all theme versions up to 1.2024, potentially allowing unauthenticated attackers to upload malicious files to the server, which could lead to remote code execution.

    MEDIUM (6.2)
    Plugin

    Avada Builder Plugin Arbitrary WordPress Action Execution Vulnerability

    Published Date: 4/15/2026

    The Avada (Fusion) Builder plugin for WordPress is vulnerable to Arbitrary WordPress Action Execution, affecting versions up to and including 3.15.1. Authenticated users with Subscriber-level access can exploit this vulnerability to execute arbitrary WordPress action hooks, potentially leading to privilege escalation or other impacts.

    MEDIUM (5.3)
    Plugin

    Sensitive Information Exposure in Avada Builder Plugin via Unprotected Metadata Keys

    Published Date: 4/15/2026

    The Avada Builder plugin for WordPress, up to version 3.15.1, contains a vulnerability allowing authenticated users to access protected post metadata. This issue arises from a failure to validate metadata key protection in the `fusion_get_post_custom_field()` function, posing a risk of exposing sensitive information even to users with minimal access rights.

    MEDIUM (6.2)
    Plugin

    Unauthorized Data Access in WordPress 3D FlipBook Plugin

    Published Date: 4/14/2026

    The 3D FlipBook plugin for WordPress, up to version 1.16.17, has a vulnerability that allows unauthorized data access due to missing capability checks in the send_post_pages_json() function. This flaw enables attackers to access metadata of draft, private, and password-protected flipbooks.

    MEDIUM (5.4)
    Plugin

    Stored XSS in Surbma | Booking.com Shortcode Plugin via Shortcode Attributes

    Published Date: 4/14/2026

    The Surbma | Booking.com Shortcode plugin for WordPress is susceptible to a Stored Cross-Site Scripting vulnerability. This flaw arises from insufficient input sanitization and output escaping on attributes provided by users interacting with the `surbma-bookingcom` shortcode, affecting versions up to and including 2.1.

    MEDIUM (5.3)
    Plugin

    Cross-Site Request Forgery Vulnerability in Aruba HiSpeed Cache Plugin

    Published Date: 4/10/2026

    The Aruba HiSpeed Cache plugin for WordPress up to version 3.0.4 is affected by a Cross-Site Request Forgery (CSRF) vulnerability. This flaw allows an attacker to reset plugin settings via a forged request if they deceive a site administrator into initiating an unintended action.

    MEDIUM (5.2)
    Plugin

    Webling Plugin Stored Cross-Site Scripting Vulnerability

    Published Date: 4/10/2026

    The Webling plugin for WordPress is affected by a stored cross-site scripting (XSS) vulnerability in versions up to 3.9.0. This flaw allows authenticated users with a Subscriber role or higher to inject malicious scripts into Webling forms and member lists, which can be executed when an administrator views these sections.

    MEDIUM (6.1)
    Plugin

    Remote Code Execution Vulnerability in Quick Playground Plugin via REST API

    Published Date: 4/9/2026

    The Quick Playground plugin for WordPress is vulnerable to remote code execution in versions up to 1.3.1 due to insufficient authorization checks on its REST API endpoints. This allows attackers to execute arbitrary code on the server by retrieving a sensitive sync code and uploading malicious PHP files.

    MEDIUM (6.0)
    Plugin

    Cross-Site Request Forgery in Advanced Contact Form 7 DB Plugin

    Published Date: 4/8/2026

    The Advanced Contact Form 7 DB plugin is susceptible to Cross-Site Request Forgery (CSRF) vulnerabilities in versions up to and including 2.0.9. This flaw allows unauthenticated attackers to potentially manipulate form entries by deceiving a site administrator into executing specific actions.

    MEDIUM (6.0)
    Plugin

    Unauthorized Data Access in Advanced Contact Form 7 DB Plugin

    Published Date: 4/8/2026

    The Advanced Contact Form 7 DB plugin up to version 2.0.9 allows unauthorized data exports due to insufficient user permission checks. Authenticated attackers with Subscriber-level access can exploit this flaw to export form submissions.

    MEDIUM (5.3)
    Plugin

    Cross-Site Request Forgery in BEAR Bulk Editor and Products Manager for WooCommerce

    Published Date: 4/8/2026

    The BEAR – Bulk Editor and Products Manager Professional by Pluginus.Net plugin for WooCommerce contains a Cross-Site Request Forgery (CSRF) vulnerability that affects all versions up to 1.1.5. This flaw allows attackers to potentially manipulate WooCommerce product data by tricking site administrators into executing unintended actions.

    MEDIUM (6.9)
    Plugin

    Cross-Site Request Forgery Vulnerability in BEAR – Bulk Editor and Products Manager Professional for WooCommerce

    Published Date: 4/8/2026

    A Cross-Site Request Forgery (CSRF) vulnerability exists in the BEAR – Bulk Editor and Products Manager Professional for WooCommerce plugin, affecting versions up to 1.1.5. This flaw allows attackers to delete WooCommerce taxonomy terms without authentication by leveraging a site administrator's or shop manager's privileges through a crafted request.

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More