WordPress Vulnerability Database

Search All Vulnerabilities

Tip: You can search by CVE ID, software name or slug, or the researcher name. Expand to read about more advanced search options.

If you want to perform more advanced lookups, you can use keywords to further refine your search.

For example, woocommerce researcher:"chloe chamberland" would search for any vulnerabilities discovered by Chloe Chamberland in software that has WooCommerce in the title.

Keywords are added in keyword:value format. If the value contains spaces, you must enclose it in quotation marks.

You can use the following keywords to add criteria to your search:

title
Searches through the title of each vulnerability for matches.
date
Returns vulnerabilities by publication date. Use YYYY-MM-DD, YYYY-MM or YYYY format.
cvss-rating
Use low, medium, high or critical to limit the search to vulnerabilities with the specified rating.
researcher
Returns vulnerabilities credited to researchers containing the given text.
software
Returns vulnerabilities discovered in software containing the given text.
software-slug
Returns vulnerabilities discovered in software exactly matching the given slug.
software-type
Use plugin, theme or core to limit the search to the specified type of software.
By selecting “Search” you acknowledge that you have read and agree to the Wordfence Intelligence Terms and Conditions.

All Vulnerabilities

Title CVE ID CVSS Researchers Date
Real Estate Directory <= 1.0.4 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation CVE-2023-28532 4.3 Dave Jong March 17, 2023
Real Estate Directory <= 1.0.5 - Cross-Site Request Forgery via rdm_activate_plugin CVE-2023-28532 4.3 March 17, 2023
CP Multi View Event Calendar <= 1.4.10 - Missing Authentication leading to Authenticated (Subscriber+) Private Form Submission CVE-2023-28492 4.3 István Márton March 16, 2023
WP Basic Elements <= 5.2.15 - Missing Authorization to Plugin Settings Update via wpbe_save_settings 4.3 March 16, 2023
Website Monetization by MageNet <= 1.0.29.1 - Cross-Site Request Forgery via admin_magenet_settings CVE-2023-22673 4.3 Mika March 16, 2023
Bulk Resize Media <= 1.1 - Cross-Site Request Forgery via bulk_resize_resize_image CVE-2022-46865 4.3 Cat March 16, 2023
HT Feed <= 1.2.7 - Cross-Site Request Forgery leading to Limited Plugin Activation CVE-2023-23804 4.3 István Márton March 16, 2023
Contact Form Email <= 1.3.31 - Missing Authorization to Feedback Submission CVE-2023-28494 4.3 István Márton March 16, 2023
Custom Options Plus <= 1.8.1 - Cross-Site Request Forgery via custom_options_plus_adm CVE-2023-28420 4.3 Justiice March 16, 2023
Chankhe <= 1.0.5 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation CVE-2023-28416 4.3 Dave Jong March 16, 2023
WP Tiles <= 1.1.2 - Authenticated(Subscriber+) Sensitive Information Exposure CVE-2023-1426 4.3 Erwan LR March 16, 2023
Import External Images <= 1.4 - Cross-Site Request Forgery via external_image_import_all_ajax CVE-2022-46866 4.3 Cat March 16, 2023
Hotel Booking Lite <= 4.6.0 - Cross-Site Request Forgery to Settings Update CVE-2023-28498 4.3 yuyudhn March 16, 2023
WP Shortcode by MyThemeShop <= 1.4.16 - Cross-Site Request Forgery CVE-2023-28495 4.3 István Márton March 16, 2023
Event Manager for WooCommerce <= 3.7.7 - Cross-Site Request Forgery leading to Uninstall Form Submission CVE-2022-47164 4.3 István Márton March 16, 2023
Contact Form 7 Redirect & Thank You Page <= 1.0.3 - Cross-Site Request Forgery via cf7rl_admin_table CVE-2023-24395 4.3 István Márton March 15, 2023
Store Locator <= 3.98.7 - Cross-Site Request Forgery to Settings Update CVE-2022-47446 4.3 rezaduty March 15, 2023
Slideshow Gallery LITE <= 1.7.6 - Cross-Site Request Forgery via admin_slides CVE-2023-28497 4.3 Rio Darmawan March 15, 2023
Slideshow Gallery LITE <= 1.7.6 - Cross-Site Request Forgery via admin_galleries CVE-2023-28497 4.3 Rio Darmawan March 15, 2023
Google XML Sitemap for Videos <= 2.6.1 - Cross-Site Request Forgery via video_sitemap_generate CVE-2023-25055 4.3 Mika March 15, 2023

Researcher Hall of Fame (Past 30 days)

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation