Stay Protected with Vulnerability Alerts

    Updated automatically every hour

    Recent WordPress Vulnerabilities

    Latest WordPress security vulnerabilities affecting plugins, themes, and core.

    MEDIUM (6.2)
    Plugin

    Cross-Site Request Forgery Vulnerability in Auto Post Scheduler Plugin

    Published Date: 3/31/2026

    The Auto Post Scheduler WordPress plugin up to version 1.84 is vulnerable to Cross-Site Request Forgery (CSRF) due to missing nonce validation in the 'aps_options_page' function. This vulnerability could allow attackers to change the plugin settings and inject malicious scripts if they can convince an administrator to click a manipulated link.

    MEDIUM (5.9)
    Plugin

    Stored Cross-Site Scripting in Ibtana WordPress Website Builder Plugin

    Published Date: 3/31/2026

    The Ibtana – WordPress Website Builder plugin is affected by a Stored Cross-Site Scripting (XSS) vulnerability, allowing contributors and above to inject malicious scripts through the 'ive' shortcode. This vulnerability affects versions up to 1.2.5.7 and results from inadequate sanitization of input and insufficient output escaping.

    MEDIUM (5.2)
    Plugin

    Unauthorized Data Modification in WooPayments Plugin for WordPress

    Published Date: 3/31/2026

    The WooPayments: Integrated WooCommerce Payments plugin for WordPress is susceptible to unauthorized data modification. This vulnerability exists due to a missing capability check in the 'save_upe_appearance_ajax' function, allowing unauthenticated attackers to alter plugin settings in versions up to 10.5.1.

    MEDIUM (6.5)
    Plugin

    Sensitive Information Exposure in Truebooker Plugin for WordPress

    Published Date: 3/31/2026

    The Truebooker plugin for WordPress is affected by a vulnerability that allows unauthorized users to access sensitive information through views PHP files in versions up to 1.1.4. This vulnerability could expose critical data to attackers via direct file access.

    MEDIUM (5.0)
    Plugin

    Sensitive Information Exposure in Ninja Forms Plugin

    Published Date: 3/28/2026

    The Ninja Forms plugin for WordPress, versions up to 3.14.1, has a vulnerability that allows authenticated users with at least Contributor-level access to expose sensitive information. The issue resides in the processing of authorization tokens via a callback function in the admin_enqueue_scripts action.

    MEDIUM (5.6)
    Theme

    Insecure Admin-Ajax Actions in Restaurant Cafeteria Theme Allow Arbitrary PHP Code Execution

    Published Date: 3/28/2026

    The Restaurant Cafeteria WordPress theme, up to version 0.4.6, has a security vulnerability where admin-ajax actions lack nonce and capability checks. This allows any logged-in user, including those with minimal permissions, to execute privileged operations, potentially leading to arbitrary PHP code execution via a user-supplied URL.

    MEDIUM (5.2)
    Theme

    Oxygen Theme AJAX SSRF Vulnerability

    Published Date: 3/28/2026

    The Oxygen Theme for WordPress contains a Server-Side Request Forgery (SSRF) vulnerability in versions up to and including 6.0.8. Exploitation of this flaw is possible via the 'laborator_calc_route' AJAX action, allowing unauthenticated attackers to initiate web requests to arbitrary locations from the WordPress server.

    MEDIUM (6.1)
    Plugin

    Cross-Site Request Forgery in Conditional Menus Plugin

    Published Date: 3/26/2026

    The Conditional Menus plugin for WordPress is affected by a Cross-Site Request Forgery (CSRF) vulnerability. This flaw allows attackers to alter conditional menu configurations when an administrator is tricked into executing a forged request.

    MEDIUM (6.4)
    Plugin

    Unauthorized Data Overwriting via REST Route in LeadConnector Plugin

    Published Date: 3/26/2026

    The LeadConnector plugin for WordPress before version 3.0.22 lacks proper authorization on a REST API route. This allows unauthenticated users to manipulate and potentially overwrite existing data through unauthorized API calls.

    MEDIUM (6.5)
    Plugin

    Stored Cross-Site Scripting in WP Lightbox 2 Plugin

    Published Date: 3/26/2026

    The WP Lightbox 2 plugin for WordPress, prior to version 3.0.7, contains a vulnerability that allows high privilege users, such as administrators, to inject malicious scripts by not properly sanitizing and escaping certain settings. This can lead to a Stored Cross-Site Scripting (XSS) attack, even when the unfiltered_html capability is restricted, such as in a multisite configuration.

    MEDIUM (5.1)
    Plugin

    Unauthenticated Arbitrary Shortcode Execution in Responsive Plus Plugin

    Published Date: 3/26/2026

    The Responsive Plus WordPress plugin prior to version 3.4.3 allows unauthenticated users to execute arbitrary shortcodes due to improper validation of input in the update_responsive_woo_free_shipping_left_shortcode AJAX action. This vulnerability could be exploited to execute unintended code on affected sites.

    MEDIUM (6.7)
    Plugin

    Path Traversal Vulnerability in Shared Files WordPress Plugin

    Published Date: 3/26/2026

    The Shared Files WordPress plugin before version 1.7.58 contains a path traversal vulnerability. This flaw allows users with the Contributor role to access arbitrary files on the server, potentially compromising sensitive data such as the site's configuration file.

    MEDIUM (5.9)
    Plugin

    Elementor Website Builder Unauthorized Template Access Vulnerability

    Published Date: 3/26/2026

    A vulnerability in the Elementor Website Builder plugin for WordPress allows authenticated users with contributor-level access and above to access private or draft templates. The incorrect authorization check is present in versions up to 3.35.7.

    MEDIUM (6.2)
    Plugin

    Reflected Cross-Site Scripting in FloristPress for Woo Plugin

    Published Date: 3/26/2026

    The FloristPress for Woo plugin up to version 7.8.2 is vulnerable to reflected XSS via the 'noresults' parameter. This allows unauthenticated users to execute arbitrary web scripts by tricking users into clicking a malicious link.

    MEDIUM (6.6)
    Core

    Authorization Flaw in Arraytics WPCafe Plugin

    Published Date: 3/25/2026

    The Arraytics WPCafe plugin for WordPress has a missing authorization vulnerability in its access control, allowing for potential unauthorized actions on affected sites. This issue exists in versions up to and including 3.0.7 and poses a risk due to incorrectly configured security levels.

    MEDIUM (5.9)
    Core

    Stored Cross-Site Scripting Vulnerability in Acato WP REST Cache

    Published Date: 3/25/2026

    The WordPress plugin 'WP REST Cache' contains a stored XSS vulnerability, identified as CVE-2026-25347, which affects versions up to and including 2026.1.0. This vulnerability allows an attacker to inject malicious scripts that could be executed in user sessions.

    MEDIUM (5.5)
    Plugin

    Privilege Escalation in Salon Booking System Pro Plugin

    Published Date: 3/25/2026

    An incorrect privilege assignment vulnerability exists in the Salon Booking System Pro plugin for WordPress, potentially allowing unauthorized privilege escalation. This vulnerability impacts versions prior to 10.30.12 of the plugin.

    MEDIUM (6.3)
    Core

    Reflected Cross-Site Scripting (XSS) in VikRestaurants Plugin

    Published Date: 3/25/2026

    A reflected Cross-Site Scripting (XSS) vulnerability exists in the VikRestaurants plugin for WordPress, affecting versions up to and including 1.5.2. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users.

    MEDIUM (5.6)
    Core

    Missing Authorization Vulnerability in WP System Log Plugin

    Published Date: 3/25/2026

    A missing authorization vulnerability has been identified in the WP System Log plugin for WordPress, which erroneously permits unauthorized access due to misconfigured access control security levels. This vulnerability affects versions up through 1.2.7.

    MEDIUM (5.7)
    Core

    Authentication Bypass in WP Swings Subscriptions for WooCommerce

    Published Date: 3/25/2026

    CVE-2026-24372 is an authentication bypass vulnerability in the Subscriptions for WooCommerce plugin, allowing attackers to manipulate input data to spoof their identity. This affects plugin versions up to and including 1.8.10.

    MEDIUM (6.0)
    Core

    Missing Authorization Vulnerability in WP User Frontend Plugin

    Published Date: 3/25/2026

    A missing authorization flaw has been discovered in the WP User Frontend plugin, affecting versions up to 4.2.5. This vulnerability allows unauthorized users to exploit incorrectly configured access control settings, potentially leading to unauthorized actions being executed within the WordPress site.

    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More