Showing 4861-4880 of 8677 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Aug 1, 2014
1 Vulnerability
Nov 24, 2015
1 Vulnerability
May 25, 2014
1 Vulnerability
Dec 18, 2014
1 Vulnerability
May 26, 2009
1 Vulnerability
Nov 9, 2012
1 Vulnerability
Aug 1, 2014
1 Vulnerability
Dec 26, 2023
1 Vulnerability
Apr 16, 2015
1 Vulnerability
Sep 28, 2022
1 Vulnerability
Jan 13, 2023
1 Vulnerability
Jun 12, 2014
1 Vulnerability
May 25, 2014
1 Vulnerability
May 8, 2013
1 Vulnerability
Apr 5, 2013
1 Vulnerability
Jun 22, 2020
1 Vulnerability
Sep 9, 2021
1 Vulnerability
Jan 23, 2024
1 Vulnerability
Jun 12, 2014
Title Number of Vulnerabilities Last Vulnerability
wp-instagram-bank 1 August 1, 2014
wp-keyword-link 1 November 24, 2015
wp-lightpop 1 May 25, 2014
wp-limit-posts-automatically 1 December 18, 2014
wp-lytebox 1 May 26, 2009
wp-matrix-gallery 1 November 9, 2012
wp-media-player 1 August 1, 2014
WP-Mobile-BankID-Integration 1 December 26, 2023
wp-mon 1 April 16, 2015
wp-Monalisa 1 September 28, 2022
WP-MUI – Mass User Input – Add and Export WP Users Quickly 1 August 5, 2022
WP-OliveCart 1 January 13, 2023
WP-Picasa-Image 1 June 12, 2014
WP-Planet 1 May 25, 2014
WP-PostViews 1 May 8, 2013
WP-Print 1 April 5, 2013
Wp-Pro-Quiz 1 June 22, 2020
wp-publications 1 September 9, 2021
WP-Reply Notify 1 January 23, 2024
wp-restful 1 June 12, 2014

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation