CVE/PSC | Application | Date | Affected versions | Description |
---|---|---|---|---|
Actual on: Jul 10, 2025, 04:07:27 | ||||
vulnerable
|
Jul 09, 2025, 22:07:15 |
Min -
Max 2.2.0
|
Missing Authorization vulnerability in Melapress Melapress File Monitor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Melapress File Monitor: from n/a before 2.2.0. | |
vulnerable
|
Jul 09, 2025, 15:07:33 |
Min -
Max 1.0.16
|
The Widget for Google Reviews plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.15 via the layout parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be up... | |
Lightbox & Modal Popup WordPress Plugin – FooBox
vulnerable
|
Jul 09, 2025, 04:07:30 |
Min -
Max 2.7.35
|
The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and including, 2.7.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
vulnerable
|
Jul 09, 2025, 01:07:32 |
Min -
Max 6.1.20
|
The Essential Addons for Elementor – Popular Elementor Templates and Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the via `Calendar` And `Business Reviews` Widgets attributes in all versions up to, and including, 6.1.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
vulnerable
|
Jul 09, 2025, 00:07:42 |
Min -
Max 2.8.5
|
The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
Guest Support – Complete customer support ticket system for WordPress
vulnerable
|
Jul 08, 2025, 18:07:45 |
Min -
Max 1.2.3
|
The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteMassTickets' function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete arbitrary support tickets. | |
vulnerable
|
Jul 08, 2025, 14:07:41 |
Min -
Max 1.2.0
|
Cross-Site Request Forgery (CSRF) vulnerability in Brian S. Reed Contact Form 7 reCAPTCHA allows Cross Site Request Forgery. This issue affects Contact Form 7 reCAPTCHA: from n/a through 1.2.0. | |
vulnerable
|
Jul 08, 2025, 14:07:28 |
Min -
Max 1.2
|
Improper Control of Generation of Code ('Code Injection') vulnerability in Scott Paterson Easy Stripe allows Remote Code Inclusion. This issue affects Easy Stripe: from n/a through 1.1. | |
vulnerable
|
Jul 08, 2025, 02:07:46 |
Min -
Max 1.2.1
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in cybio Gallery Widget allows SQL Injection. This issue affects Gallery Widget: from n/a through 1.2.1. | |
Contact Us Page – Contact People
vulnerable
|
Jul 07, 2025, 21:07:01 |
Min -
Max 3.7.4
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Truman Contact Us page - Contact people LITE allows SQL Injection. This issue affects Contact Us page - Contact people LITE: from n/a through 3.7.4. |