Vulnerabilities protected by our XSS: Cross Site Scripting firewall rule

15,645,576
Attacks Blocked in Past 24 Hours

Showing 121-140 of 7,094 Vulnerabilities

Title CVE ID CVSS Vector Date
BeBetter Social Icons <= 2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51880 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
AgendaPress – Easily Publish Meeting Agendas and Programs on WordPress <= 1.0.8 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51807 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Bitcoin Payments <= 1.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51826 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Anant Addons for Elementor <= 1.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51813 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Add Ribbon Shortcode <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51823 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Boombox Shortcode <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51827 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Community Yard Sale <= 1.1.11 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51846 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
AchillesTheme-shortcodes <= 0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51878 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
best bootstrap widgets for elementor <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51851 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Be Shortcodes <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51881 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Alert Me! <= 0.4.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51825 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Awesome Fitness Testimonials <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51806 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More <= 1.8.3 - Reflected Cross-Site Scripting CVE-2024-10876 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 8, 2024
Brand my Footer <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-51801 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 8, 2024
eewee admin custom <= 1.8.2.4 - Reflected Cross-Site Scripting CVE-2024-51780 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Conversion Helper <= 1.12 - Reflected Cross-Site Scripting CVE-2024-10676 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Simplistic SEO <= 2.3.0 - Reflected Cross-Site Scripting CVE-2024-51719 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
SVT Simple <= 1.0.1 - Reflected Cross-Site Scripting CVE-2024-51759 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Saragna <= 1.0 - Reflected Cross-Site Scripting CVE-2024-51711 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024
Daily Image <= 1.0 - Reflected Cross-Site Scripting CVE-2024-51776 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 4, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation