CVE ID | CVSS | Researchers | Package Name | Version | Title | Severity | Published Date |
---|---|---|---|---|---|---|---|
No CVE | 7.5 | Unknown | Mayosis Core | * - 5.4.1 | Mayosis Core <= 5.4.1 - Unauthenticated Arbitrary File Read | High | 2025-04-24 20:29:52 |
No CVE | 6.1 | Unknown | 1 Decembrie 1918 | * - 1.dec.2012 | 1 Decembrie 1918 <= 1.dec.2012 - Cross-Site Request Forgery to Stored Cross-Site Scripting | Medium | 2025-04-24 20:01:14 |
No CVE | 6.1 | Unknown | Custom Admin-Bar Favorites | * - 0.1 | Custom Admin-Bar Favorites <= 0.1 - Reflected Cross-Site Scripting | Medium | 2025-04-24 18:32:36 |
No CVE | 6.1 | Unknown | Ajax Comment Form CST | * - 1.2 | Ajax Comment Form CST <= 1.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting | Medium | 2025-04-24 18:32:15 |
No CVE | 6.1 | Unknown | Add Google +1 (Plus one) social share Button | * - 1.0.0 | Add Google +1 (Plus one) social share Button <= 1.0.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting | Medium | 2025-04-24 18:32:13 |
No CVE | 4.9 | Unknown | Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder | * - 2.18.3 | Contact Form by Bit Form <= 2.18.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | Medium | 2025-04-24 16:58:42 |
No CVE | 6.5 | Unknown | ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) | * - 3.1.2 | ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) <= 3.1.2 - Unauthenticated Server-Side Request Forgery via URL Parameter | Medium | 2025-04-24 16:21:41 |
No CVE | 6.4 | Unknown | Breeze Display | * - 1.2.3 | Breeze Display <= 1.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via cal_size Parameter | Medium | 2025-04-24 09:50:49 |
No CVE | 7.2 | Unknown | eForm - WordPress Form Builder | * - 4.18.0 | eForm <= 4.18.0 - Unauthenticated Stored Cross-Site Scripting | High | 2025-04-24 09:45:31 |
No CVE | 8.1 | Unknown | JobSearch WP Job Board | * - 2.8.8 | JobSearch WP Job Board <= 2.8.8 - Authentication Bypass via Social Logins | High | 2025-04-24 00:00:00 |
No CVE | 5.3 | Unknown | Prevent Direct Access – Protect WordPress Files | * - 2.8.8 | Prevent Direct Access – Protect WordPress Files <= 2.8.8 - Unauthenticated Sensitive Information Exposure | Medium | 2025-04-24 00:00:00 |
No CVE | 5.3 | Unknown | WS Form LITE – Drag & Drop Contact Form Builder for WordPress | * - 1.10.35 | WS Form LITE – Drag & Drop Contact Form Builder for WordPress <= 1.10.35 - Missing Authorization to Unauthenticated Sensitive Information Exposure | Medium | 2025-04-24 00:00:00 |
No CVE | 6.4 | Unknown | Able Player, accessible HTML5 media player | * - 1.2.1 | Able Player, accessible HTML5 media player <= 1.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via preload Parameter | Medium | 2025-04-24 00:00:00 |
No CVE | 5.3 | Unknown | Upsell Funnel Builder for WooCommerce | * - 3.0.0 | Upsell Funnel Builder for WooCommerce <= 3.0.0 - Unauthenticated Order Manipulation | Medium | 2025-04-24 00:00:00 |
No CVE | 9.8 | Unknown | Service Finder Bookings | * - 5.1 | Service Finder Bookings <= 5.1 - Unauthenticated Privilege Escalation via 'nsl_registration_store_extra_input' | Critical | 2025-04-24 00:00:00 |
No CVE | 8.8 | Unknown | Vikinger | * - 1.9.30 | Vikinger <= 1.9.30 - Authenticated (Subscriber+) Privilege Escalation via 'vikinger_user_meta_update_ajax' | High | 2025-04-24 00:00:00 |
No CVE | 5.4 | Unknown | Prevent Direct Access – Protect WordPress Files | 2.8.6 - 2.8.8.2 | Prevent Direct Access 2.8.6 - 2.8.8.2 - Incorrect Authorization to Authenticated (Contributor+) Multiple Media Actions | Medium | 2025-04-24 00:00:00 |
No CVE | 8.8 | Unknown | BM Content Builder | * - 3.16.2.1 | BM Content Builder <= 3.16.2.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update | High | 2025-04-24 00:00:00 |
No CVE | 6.4 | Unknown | Advanced Accordion Gutenberg Block | * - 5.0.1 | Advanced Accordion Gutenberg Block <= 5.0.1 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | Medium | 2025-04-23 19:59:13 |
No CVE | 6.4 | Unknown | Lottie Player- Great Lottie Player Solution | * - 1.1.8 | Lottie Player <= 1.1.8 - Authenticated (Author+) Stored Cross-Site Scripting via File Upload | Medium | 2025-04-23 19:57:53 |
No CVE | 6.5 | Unknown | ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes | * - 1.4.9 | ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes <= 1.4.9 - Authenticated (Subscriber+) SQL Injection | Medium | 2025-04-23 19:57:32 |
No CVE | 7.2 | Unknown | WPMasterToolKit (WPMTK) – All in one plugin | * - 1.15.0 | WPMasterToolKit (WPMTK) – All in one plugin <= 2.5.2 - Authenticated (Administrator+) to Arbitrary File Read and Write | High | 2025-04-23 19:54:09 |
No CVE | 9.1 | Unknown | Database Toolset | * - 1.8.4 | Database Toolset <= 1.8.4 - Unauthenticated Arbitrary File Deletion | Critical | 2025-04-23 19:48:48 |
No CVE | 6.4 | Unknown | FuseDesk | * - 6.7 | FuseDesk <= 6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via successredirect Parameter | Medium | 2025-04-23 19:47:53 |
No CVE | 8.3 | Unknown | Verification SMS with TargetSMS | * - 1.5 | Verification SMS with TargetSMS <= 1.5 - Unauthenticated Limited Remote Code Execution | High | 2025-04-23 19:47:36 |
A plugin to fetch and display vulnerabilities from the Wordfence Intelligence Vulnerability Database API with advanced search, filtering, and pagination functionality.
== Description ==
The **Wordfence Intelligence API Plugin** allows you to integrate with the Wordfence Intelligence Vulnerability Database and display a list of vulnerabilities on your WordPress site. The plugin supports AJAX-based search, filtering, and pagination to enhance user experience.
**Key Features:**
– Fetch vulnerabilities from the Wordfence Intelligence API.
– Display vulnerabilities in a customizable table with sorting, filtering, and search.
– Responsive design for mobile and desktop users.
– AJAX-powered updates for seamless interaction without page reloads.
– Pagination with range limits and ellipses for a clean UI.
**Shortcode Example:**
Add the following shortcode to any page or post to display the vulnerabilities:
“`html
wfi_vulnerabilities
Contact us today to request a consultation and discover how our expert solutions can help your business thrive.