CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “wordpress”

382 vulnerabilities found for “wordpress”

Page 1 of 20

CVE-2024-9422
MEDIUM6.6

The GEO my WP WordPress plugin before 4.5, gmw-premium-settings WordPress plugin before 3.1 does not sufficiently validate files to be uploaded, which could allow attackers to upload arbitrary files such as PHP on the server.

geomywp / geo_my_wordpress+1
Network
Published Nov 22, 2024
Page 1 of 20
CVE-2023-3211
CRITICAL9.8

The WordPress Database Administrator WordPress plugin through 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.

dmparekh / wordpress_database_administrator
Network
Published Jan 16, 2024
CVE-2023-41129
MEDIUM4.3

Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.This issue affects Patreon WordPress: from n/a through 1.8.6.

patreon / patreon_wordpress
Network
Published Nov 18, 2023
CVE-2021-4374
CRITICAL9.1

The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.

valvepress / wordpress_automatic_plugin
Network
Published Jun 7, 2023
CVE-2022-47161
MEDIUM4.3

Cross-Site Request Forgery (CSRF) vulnerability in The WordPress.Org community Health Check & Troubleshooting plugin <= 1.5.1 versions.

wordpress / health_check_\&_troubleshooting
Network
Published May 25, 2023
CVE-2022-4321
MEDIUM6.1

The PDF Generator for WordPress plugin before 1.1.2 includes a vendored dompdf example file which is susceptible to Reflected Cross-Site Scripting and could be used against high privilege users such as admin

wpswings / pdf_generator_for_wordpress
Network
Published Feb 6, 2023
CVE-2022-4392
MEDIUM5.4

The iPanorama 360 WordPress Virtual Tour Builder plugin through 1.6.29 does not sanitise and escape some of its settings, which could allow users such as contributor+ to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

ipanorama_360_wordpress_virtual_tour_builder_project / ipanorama_360_wordpress_virtual_tour_builder
Network
Published Jan 9, 2023
CVE-2022-2398
MEDIUM4.8

The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

najeebmedia / wordpress_comments_fields
Network
Published Aug 8, 2022
CVE-2021-25026
MEDIUM5.5

The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

patreon / patreon_wordpress
Network
Published Mar 14, 2022
CVE-2021-24623
MEDIUM4.8

The WordPress Advanced Ticket System, Elite Support Helpdesk WordPress plugin before 1.0.64 does not sanitize or escape form values before saving to the database or when outputting, which allows high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

ticket-system / wordpress_advanced_ticket_system
Network
Published Sep 13, 2021
CVE-2021-29476
CRITICAL9.8

Requests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.

wordpress / requests+2
Network
Published Apr 27, 2021
CVE-2021-24227
HIGH7.5

The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.

patreon / patreon_wordpress
Network
Published Apr 12, 2021
CVE-2021-24231
MEDIUM6.5

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link.

patreon / patreon_wordpress
Network
Published Apr 12, 2021
CVE-2021-24229
CRITICAL9.6

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

patreon / patreon_wordpress
Network
Published Apr 12, 2021
CVE-2021-24230
HIGH8.1

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.

patreon / patreon_wordpress
Network
Published Apr 12, 2021
CVE-2021-24228
CRITICAL9.6

The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized.

patreon / patreon_wordpress
Network
Published Apr 12, 2021
CVE-2020-10257
CRITICAL9.8

The ThemeREX Addons plugin before 2020-03-09 for WordPress lacks access control on the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because includes/plugin.rest-api.php calls trx_addons_rest_get_sc_layout with an unsafe sc parameter.

themerex / addons+123
Network
Published Mar 10, 2020
CVE-2013-1400
CRITICAL9.8

Multiple SQL injection vulnerabilities in CWPPoll.js in WordPress Poll Plugin 34.5 for WordPress allow attackers to execute arbitrary SQL commands via the pollid or poll_id parameter in a viewPollResults or userlogs action.

cardozatechnologies / wordpress_poll+1
Network
Published Feb 13, 2020
CVE-2013-1401
CRITICAL9.8

Multiple security bypass vulnerabilities in the editAnswer, deleteAnswer, addAnswer, and deletePoll functions in WordPress Poll Plugin 34.5 for WordPress allow a remote attacker to add, edit, and delete an answer and delete a poll.

cardozatechnologies / wordpress_poll
Network
Published Feb 13, 2020
CVE-2018-20984
CRITICAL9.8

The patreon-connect plugin before 1.2.2 for WordPress has Object Injection.

patreon / patreon_wordpress
Network
Published Aug 22, 2019