WordPress Vulnerability Database

Search All Vulnerabilities

Tip: You can search by CVE ID, software name or slug, or the researcher name. Expand to read about more advanced search options.

If you want to perform more advanced lookups, you can use keywords to further refine your search.

For example, woocommerce researcher:"chloe chamberland" would search for any vulnerabilities discovered by Chloe Chamberland in software that has WooCommerce in the title.

Keywords are added in keyword:value format. If the value contains spaces, you must enclose it in quotation marks.

You can use the following keywords to add criteria to your search:

title
Searches through the title of each vulnerability for matches.
date
Returns vulnerabilities by publication date. Use YYYY-MM-DD, YYYY-MM or YYYY format.
cvss-rating
Use low, medium, high or critical to limit the search to vulnerabilities with the specified rating.
researcher
Returns vulnerabilities credited to researchers containing the given text.
software
Returns vulnerabilities discovered in software containing the given text.
software-slug
Returns vulnerabilities discovered in software exactly matching the given slug.
software-type
Use plugin, theme or core to limit the search to the specified type of software.
By selecting “Search” you acknowledge that you have read and agree to the Wordfence Intelligence Terms and Conditions.

All Vulnerabilities

Title CVE ID CVSS Researchers Date
Ahime Image Printer <= 1.0.0 - Unauthenticated Arbitrary File Download CVE-2024-49245 9.8 stealthcopter October 14, 2024
Analyse Uploads <= 0.5 - Unauthenticated Arbitrary File Deletion CVE-2024-49253 9.8 stealthcopter October 14, 2024
ajax-extend <= 1.0 - Unauthenticated Remote Code Execution CVE-2024-49254 9.8 stealthcopter October 14, 2024
Azz Anonim Posting <= 0.9 - Unauthenticated Arbitrary File Upload CVE-2024-49257 9.8 stealthcopter October 14, 2024
Recently <= 1.1 - Unauthenticated PHP Object Injection CVE-2024-49218 9.8 LVT-tholv2k October 14, 2024
Adding drop down roles in registration <= 1.1 - Unauthenticated Privilege Escalation CVE-2024-49217 9.8 João Pedro Soares de Alcântara October 14, 2024
WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php CVE-2024-9047 9.8 Arkadiusz Hydzik October 11, 2024
GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload CVE-2024-9234 9.8 Sean Murphy October 10, 2024
Pedalo Connector <= 2.0.5 - Authentication Bypass to Administrator CVE-2024-9822 9.8 István Márton October 10, 2024
Hunk Companion <= 1.8.4 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation/Activation CVE-2024-9707 9.8 Sean Murphy October 10, 2024
Talkback <= 1.0 - Unauthenticated PHP Object Injection CVE-2024-48033 9.8 LVT-tholv2k October 9, 2024
Disc Golf Manager <= 1.0.0 - Unauthenticated PHP Object Injection CVE-2024-48026 9.8 LVT-tholv2k October 9, 2024
Telecash Ricaricaweb <= 2.2 - Unauthenticated PHP Object Injection CVE-2024-48030 9.8 LVT-tholv2k October 9, 2024
IP Loc8 <= 1.1 - Unauthenticated PHP Object Injection CVE-2024-48028 9.8 LVT-tholv2k October 9, 2024
UserPlus <= 2.0 - Unauthenticated Privilege Escalation CVE-2024-9518 9.8 István Márton October 9, 2024
Wechat Social login <= 1.3.0 - Authentication Bypass CVE-2024-9106 9.8 István Márton September 30, 2024
WordPress & WooCommerce Affiliate Program <= 8.4.1 - Authentication Bypass to Account Takeover and Privilege Escalation CVE-2024-9289 9.8 Tonn September 30, 2024
Wechat Social login <= 1.3.0 - Unauthenticated Arbitrary File Upload CVE-2024-9108 9.8 István Márton September 30, 2024
Echo RSS Feed Post Generator <= 5.4.6 - Unauthenticated Privilege Escalation CVE-2024-9265 9.8 Tonn September 30, 2024
JobSearch <= 2.5.9 - Unauthenticated PHP Object Injection CVE-2024-47636 9.8 Bonds September 30, 2024

Researcher Hall of Fame (Past 30 days)

Rank Name
Vulnerabilities since Dec 4, 2024
Vulns
1 SOPROBRO 81
2 vgo0 48
3 Peter Thaleikis 42
4 Mika 29
5 Francesco Carlucci 24
6 João Pedro Soares de Alcântara 24
7 stealthcopter 19
8 zaim 16
9 Colin Xu 14
10 thiennv 14
11 yudha 13
12 theviper17y 13
13 Arkadiusz Hydzik 13
14 zakaria 12
15 ardias 12
16 Tieu Pham Trong Nhan 11
17 Lucio Sá 11
18 Gab 10
19 mikemyers 9
20 LVT-tholv2k 9

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation