WordPress Vulnerability Database

Search All Vulnerabilities

Tip: You can search by CVE ID, software name or slug, or the researcher name. Expand to read about more advanced search options.

If you want to perform more advanced lookups, you can use keywords to further refine your search.

For example, woocommerce researcher:"chloe chamberland" would search for any vulnerabilities discovered by Chloe Chamberland in software that has WooCommerce in the title.

Keywords are added in keyword:value format. If the value contains spaces, you must enclose it in quotation marks.

You can use the following keywords to add criteria to your search:

title
Searches through the title of each vulnerability for matches.
date
Returns vulnerabilities by publication date. Use YYYY-MM-DD, YYYY-MM or YYYY format.
cvss-rating
Use low, medium, high or critical to limit the search to vulnerabilities with the specified rating.
researcher
Returns vulnerabilities credited to researchers containing the given text.
software
Returns vulnerabilities discovered in software containing the given text.
software-slug
Returns vulnerabilities discovered in software exactly matching the given slug.
software-type
Use plugin, theme or core to limit the search to the specified type of software.
By selecting “Search” you acknowledge that you have read and agree to the Wordfence Intelligence Terms and Conditions.

All Vulnerabilities

8.6
CVE ID Unknown
May 23, 2019
Researcher: Admavidhya N
8.6
CVE ID Unknown
Nov 13, 2017
Researcher: Jouko Pynnöne
8.6
CVE ID Unknown
Apr 14, 2015
Researcher: James Hooker
Title CVE ID CVSS Researchers Date
WeForms <= 1.4.7 - CSV injection via form entry CVE-2020-22276 8.6 Mohamad Pishdar August 13, 2020
WordPress WP-Advanced-Search <= 3.3.3 - Unauthenticated Database Export 8.6 Florian Hauser March 5, 2020
WP SlackSync <= 1.8.5 - Sensitive Information Disclosure CVE-2019-14366 8.6 fs0c131y November 12, 2019
Simple File List <= 3.2.4 - Arbitrary File Deletion 8.6 Admavidhya N May 23, 2019
Ninja Forms Contact Form <= 3.3.13 - CSV Injection CVE-2018-16308 8.6 August 19, 2018
Export Users to CSV <= 1.1.1 - CSV Injection CVE-2018-15571 8.6 Javier Olmedo August 14, 2018
Contact Form 7 to Database Extension 2.10.32 - CSV Injection CVE-2018-9035 8.6 April 9, 2018
Formidable Form Builder < 2.05.03 - SQL Injection 8.6 Jouko Pynnöne November 13, 2017
W3 Total Cache <= 0.9.4 - Server-Side Request Forgery leading to Host Information Disclosure 8.6 Jouko Pynnöne October 31, 2016
Zip Attachments <= 1.5 - Directory Traversal CVE-2015-4694 8.6 Larry W. Cashdollar June 12, 2015
MiwoFTP < 1.0.5 - Arbitrary File Download 8.6 James Hooker April 14, 2015
Revive Old Posts – Social Media Auto Post and Scheduling Plugin < 8.0.0 - Authorization Bypass 8.6 James Hooker February 2, 2015
Dewplayer <= 1.2 and Advanced Dewplayer < 1.5 - Content Spoofing/Injection 8.6 Eugene Dokukin December 23, 2013
Modern Events Calendar <= 7.12.1 - Authenticated (Subscriber+) Server Side Request Forgery CVE-2024-6522 8.5 Foxyyy August 6, 2024
Barcode Scanner with Inventory & Order Manager <= 1.6.1 - Authenticated (Subscriber+) SQL Injection CVE-2024-38708 8.5 akas wisnu aji July 11, 2024
ElementsKit PRO <= 3.6.1 - Authenticated (Contributor+) Server-Side Request Forgery CVE-2024-4404 8.5 Ngô Thiên An (ancorn_) June 13, 2024
MemberPress <= 1.11.29 - Authenticated (Contributor+) Blind Server-Side Request Forgery via mepr-user-file Shortcode CVE-2024-5031 8.5 stealthcopter May 21, 2024
NextScripts: Social Networks Auto-Poster <= 4.4.3 - Authenticated(Subscriber+) Sensitive Information Exposure CVE-2024-2088 8.5 Colin Xu May 21, 2024
Gutenberg Blocks by Kadence Blocks – Page Builder Features <= 3.1.26 - Authenticated(Contributor+) Server-Side Request Forgery (SSRF) CVE-2023-6964 8.5 Lucio Sá April 9, 2024
TablePress <= 2.2.4 - Authenticated(Author+) Server Side Request Forgery(SSRF) via _get_import_files CVE-2024-23825 8.5 isacaya January 31, 2024

Researcher Hall of Fame (Past 30 days)

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation