WordPress Vulnerability Database

Search All Vulnerabilities

Tip: You can search by CVE ID, software name or slug, or the researcher name. Expand to read about more advanced search options.

If you want to perform more advanced lookups, you can use keywords to further refine your search.

For example, woocommerce researcher:"chloe chamberland" would search for any vulnerabilities discovered by Chloe Chamberland in software that has WooCommerce in the title.

Keywords are added in keyword:value format. If the value contains spaces, you must enclose it in quotation marks.

You can use the following keywords to add criteria to your search:

title
Searches through the title of each vulnerability for matches.
date
Returns vulnerabilities by publication date. Use YYYY-MM-DD, YYYY-MM or YYYY format.
cvss-rating
Use low, medium, high or critical to limit the search to vulnerabilities with the specified rating.
researcher
Returns vulnerabilities credited to researchers containing the given text.
software
Returns vulnerabilities discovered in software containing the given text.
software-slug
Returns vulnerabilities discovered in software exactly matching the given slug.
software-type
Use plugin, theme or core to limit the search to the specified type of software.
By selecting “Search” you acknowledge that you have read and agree to the Wordfence Intelligence Terms and Conditions.

All Vulnerabilities

9.1
CVE ID Unknown
Jan 8, 2021
Researcher: Pagely
9.1
CVE ID Unknown
Oct 15, 2020
Researchers: Erwan LR, RE-ALTER
Title CVE ID CVSS Researchers Date
Extensive VC Addons for WPBakery page builder <= 1.9 - Unauthenticated Local File Inclusion CVE-2023-0159 9.1 dc11 January 23, 2023
WooCommerce Chained Products < 2.12.0 - Missing Authorization to Arbitrary Options Update CVE-2022-4872 9.1 WPScanTeam January 4, 2023
Images Optimize and Upload CF7 <= 2.1.4 - Missing Authorization to Arbitrary File Deletion CVE-2022-4101 9.1 cydave December 21, 2022
Comic Book Management System < 2.2.0 - Authenticated (Administrator+) SQL Injection CVE-2022-3856 9.1 Kunal Sharma, Daniel Krohmer November 14, 2022
Firebase PHP-JWT < 6.0.0 - Algorithm Confusion CVE-2021-46743 9.1 November 11, 2022
WatchTowerHQ <= 3.6.15 - Unauthenticated Arbitrary File Deletion CVE-2022-44584 9.1 Dave Jong November 1, 2022
SearchWP Live Ajax Search <= 1.6.2 - Directory Traversal and Local File Inclusion CVE-2022-3227 9.1 Muhammad Zeeshan (Xib3rR4dAr) September 15, 2022
Alphabetic Pagination <= 3.0.7 - Missing Authorization to Unauthenticated Arbitrary Options Update 9.1 August 25, 2022
WP All Import <= 3.6.7 - Authenticated (Administrator+) Arbitrary Code Execution CVE-2022-36386 9.1 Universe June 28, 2022
Formcraft3 <= 3.8.27 - Server Side Request Forgery CVE-2022-0591 9.1 Brandon James Roldan (tomorrowisnew) February 28, 2022
Blackhole for Bad Bots <= 3.3.1 - Arbitrary IP Address Blocking via IP Spoofing CVE-2022-1165 9.1 Daniel Ruf January 31, 2022
JS Job Manager < 1.1.9 - Arbitrary Plugin Installation/Activation 9.1 spacehen September 30, 2021
WordPress Automatic Plugin <= 3.53.2 - Unauthenticated Arbitrary Options Update CVE-2021-4374 9.1 Jerome Bruandet September 6, 2021
OMGF <= 4.5.3 - Unauthenticated Path Traversal in REST API CVE-2021-24638 9.1 apple502j August 23, 2021
Import XML and RSS Feeds <= 2.0.2 - Server-Side Request Forgery CVE-2020-24148 9.1 Suzhou Aurora Infinity Information Technology Co April 13, 2021
WordPress Importer : Import any XML File to WordPress < 1.0.1 - Server-Side Request Forgery CVE-2020-24147 9.1 Suzhou Aurora Infinity Information Technology Co April 13, 2021
Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload CVE-2021-24220 9.1 Wordfence March 24, 2021
uListing <= 1.6.6 - Unauthenticated Arbitrary Post/Page Deletion CVE-2021-4357 9.1 Jerome Bruandet January 28, 2021
Modal Survey <= 2.0.1.8 - PHP Object Injection 9.1 Pagely January 8, 2021
Realia <= 1.4.0 - Arbitrary Post Deletion 9.1 Erwan LR, RE-ALTER October 15, 2020

Researcher Hall of Fame (Past 30 days)

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation