WordPress Vulnerability Database

Search All Vulnerabilities

Tip: You can search by CVE ID, software name or slug, or the researcher name. Expand to read about more advanced search options.

If you want to perform more advanced lookups, you can use keywords to further refine your search.

For example, woocommerce researcher:"chloe chamberland" would search for any vulnerabilities discovered by Chloe Chamberland in software that has WooCommerce in the title.

Keywords are added in keyword:value format. If the value contains spaces, you must enclose it in quotation marks.

You can use the following keywords to add criteria to your search:

title
Searches through the title of each vulnerability for matches.
date
Returns vulnerabilities by publication date. Use YYYY-MM-DD, YYYY-MM or YYYY format.
cvss-rating
Use low, medium, high or critical to limit the search to vulnerabilities with the specified rating.
researcher
Returns vulnerabilities credited to researchers containing the given text.
software
Returns vulnerabilities discovered in software containing the given text.
software-slug
Returns vulnerabilities discovered in software exactly matching the given slug.
software-type
Use plugin, theme or core to limit the search to the specified type of software.
By selecting “Search” you acknowledge that you have read and agree to the Wordfence Intelligence Terms and Conditions.

All Vulnerabilities

6.5
CVE ID Unknown
Feb 14, 2019
Researcher: Mikey Veenstra
6.5
May 10, 2018
Researchers:
6.5
CVE ID Unknown
Nov 2, 2017
Researcher: Tom Adams
6.5
CVE ID Unknown
Aug 7, 2017
Researchers:
6.5
CVE ID Unknown
May 5, 2017
Researcher: James Golovich
6.5
CVE ID Unknown
Sep 11, 2016
Researchers:
Title CVE ID CVSS Researchers Date
WP Cost Estimation < 9.660 - Upload Directory Traversal 6.5 Mikey Veenstra February 14, 2019
Forminator Plugin <= 1.5.3.1 - SQL Injection CVE-2019-9568 6.5 Tim Coen February 6, 2019
Open Graph and Twitter Card Tags <= 2.2.4.1 - Unauthenticated Cross-Site Scripting 6.5 Thomas Chauchefoin June 27, 2018
Tooltipy < 5.1 - Cross-Site Request Forgery CVE-2018-1000505 6.5 dwxsupport June 20, 2018
Digital Goods < 2.2 - Cross-Site Request Forgery CVE-2018-11633 6.5 ThreatPress June 3, 2018
Add Social Share Buttons for Whatsapp and Viber < 1.1 - Cross-Site Request Forgery CVE-2018-11632 6.5 ThreatPress May 30, 2018
Woocommerce Category Banner Management <= 1.1.0 - Missing Authorization CVE-2018-11579 6.5 Jack K. May 29, 2018
BBE < 1.53 - Authorization Bypass CVE-2018-11244 6.5 May 10, 2018
WP Image Zoom <= 1.23 - Cross-Site Request Forgery to Denial of Service CVE-2018-1000510 6.5 Tom Adams March 29, 2018
BuddyPress Xprofile Custom Fields Type <= 2.6.3 - Arbitrary File Deletion 6.5 Lenon Leite January 4, 2018
Like Button Rating <= 2.5.3 - Arbitrary Settings Change 6.5 Tom Adams November 2, 2017
Insert Pages < 3.2.4 - Authenticated Directory Traversal CVE-2017-18586 6.5 September 29, 2017
jQuery HTML5 File Upload <= 3.0 - Unauthenticated Settings Update 6.5 August 7, 2017
Embed Plus Plugin for YouTube <= 11.8.1 - Cross-Site Request Forgery CVE-2017-1000224 6.5 Mallory Adams July 25, 2017
Download Monitor <= 1.9.6 - Missing Authorization 6.5 James Golovich May 5, 2017
CopySafe Web Protection < 2.6 - Cross-Site Request Forgery CVE-2017-8100 6.5 Zhiyang Zeng April 7, 2017
MailPoet Newsletters <= 2.7.2 - SQL Injection 6.5 September 11, 2016
MailPoet Newsletters <= 2.7.2 - Reflected Cross-Site Scripting 6.5 Sipke Mellema September 10, 2016
WordPress Core < 4.6.1 - Authenticated Directory Traversal to Arbitrary File Access CVE-2016-7169 6.5 Dominik Schilling September 7, 2016
WordPress Core <= 4.5.3 - Denial of Service CVE-2016-6896 6.5 Yorick Koster, August 22, 2016

Researcher Hall of Fame (Past 30 days)

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation