WordPress

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in WordPress 5.9.9

    Fixed

    WordPress, a popular website building platform, has a security flaw that allows attackers to inject harmful code into web pages. This can happen when someone with certain access levels tries to use a...

    Read More
  • Access violation vulnerability in WordPress 4.1

    Fixed

    WordPress Core, a popular website platform, has a security issue called Directory Traversal. This affects versions up to 6.5.5 and can be exploited through the Template Part block. This means that pe...

    Read More
  • Input validation vulnerability in WordPress 5.9.9

    Fixed

    WordPress Core is susceptible to a security issue called Stored Cross-Site Scripting. This can happen in different versions up to 6.5.5 because the input and output of URLs are not properly checked f...

    Read More
  • Input validation vulnerability in WordPress 6.4.0

    Fixed

    WordPress Core has a security issue that allows hackers to remotely execute code using a PHP gadget. This can happen in versions 6.4.0 and 6.4.1 because of a specific method called "__destruct" in th...

    Read More
  • Input validation vulnerability in WordPress 6.1.5

    Fixed

    WordPress Core has a security issue where user display names can be used to inject harmful scripts into pages. This can be done by both authenticated attackers with certain levels of access and unaut...

    Read More
  • Access violation vulnerability in WordPress 6.4.3

    Fixed

    WordPress Core, a popular website building platform, has a security flaw that can put sensitive information at risk. This flaw affects versions up to 6.4.3 and is caused by the redirect_guess_404_per...

    Read More
  • Weak configuration vulnerability found in WordPress

    Fixed

    WordPress Core, the software used to build websites, was vulnerable to a type of attack called a Denial of Service from Cache Poisoning in versions between 4.7.0 and 6.3.1. When a request was sent to ...

    Read More
  • Input validation vulnerability in WordPress 6.3.1

    Fixed

    WordPress has identified a security vulnerability in versions 5.9 to 6.3.1 that allows malicious attackers with contributor-level privileges or higher to inject malicious scripts into pages that will...

    Read More
  • Input validation vulnerability in WordPress 5.6.11

    Fixed

    WordPress Core, the software used to create and manage websites, is vulnerable to a type of attack called Reflected Cross-Site Scripting. This vulnerability exists in versions 5.6 to 6.3.1 and is cau...

    Read More
  • Input validation vulnerability in WordPress 6.3.1

    Fixed

    WordPress Core, a popular website building platform, has a security vulnerability in versions 6.3 and 6.3.1. This means that malicious attackers with certain permissions can add code to webpages that...

    Read More
  • Access violation vulnerability in WordPress 6.3.1

    Fixed

    WordPress Core is vulnerable to leaking sensitive information in versions up to 6.3.1. If someone has contributor-level access or higher, they can view comments on posts that should be protected.

    Read More
  • Input validation vulnerability in WordPress 4.1.38

    Fixed

    WordPress Core, up to version 6.3.1, has a security vulnerability that allows attackers with subscriber-level or higher privileges to execute any type of code. This vulnerability is due to a lack of ...

    Read More
  • Access violation vulnerability in WordPress 4.7.26

    Fixed

    WordPress Core, the software used to create websites, has a weakness in versions 4.7.0 to 6.3.1 which can expose sensitive information. If someone searches for a user, the search results may include ...

    Read More
  • Input validation vulnerability in WordPress 5.9.7

    Fixed

    WordPress versions up to and including 6.2.1 have a security vulnerability in the way it processes shortcodes in user-generated content in block themes. This could give malicious actors the ability t...

    Read More
  • Input validation vulnerability in WordPress 4.1

    Fixed

    WordPress Core, a content management system, is vulnerable to a type of attack known as cross-site scripting. This means that attackers with certain permissions could inject malicious code into pages...

    Read More
  • Access violation vulnerability in WordPress 4.1

    Fixed

    WordPress Core, up to and including version 6.2, has a security vulnerability that could be exploited by unauthenticated attackers. This vulnerability allows them to access and load any translation f...

    Read More
  • Input validation vulnerability in WordPress 4.1

    Fixed

    WordPress Core, the software powering many websites, includes a feature called "shortcodes". In versions up to, and including, 6.2, shortcodes can be used in user-generated content on "block themes"....

    Read More
  • Input validation vulnerability in WordPress 4.1

    Fixed

    WordPress Core is a type of software that was not properly made secure in versions up to 6.2. This flaw means that people with certain levels of access, such as contributors and above, could add any ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a security vulnerability that affects WordPress versions before 4.5.3. An attacker can use a crafted attachment name in the column_title function in the wp-admin/includes...

    Read More
  • Input validation vulnerability in WordPress 4.1

    Fixed

    WordPress Core versions up to and including 6.2 have a security vulnerability that allows unauthenticated users to update the thumbnail image associated with existing attachments. This is accomplishe...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, the software used to run websites, is vulnerable to SQL Injection in versions up to 6.0.3. This means that an attacker can use a plugin or theme installed on a website to get access t...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 3.4

    Fixed

    WordPress versions before 3.4.1 had a security vulnerability that allowed people who were not authorized to view certain posts to see them anyway. These posts may have contained sensitive information

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.9.5 of WordPress

    Read More
  • Input validation vulnerability in WordPress 1.5.1

    Fixed

    Attackers could use a weakness in the Wordpress 1.5 and earlier software to gain access to the website and execute commands that could potentially damage the website. This weakness is found in the wp-...

    Read More
  • Input validation vulnerability in WordPress 1.5.1.3

    Fixed

    A security issue has been found in WordPress versions 1.5.1.3 and earlier. This issue allows people from outside to gain access to a WordPress website and execute harmful code. The vulnerability is re...

    Read More
  • Input validation vulnerability in WordPress 2.8.5

    Fixed

    A security vulnerability in a certain version of WordPress (before 2.8.6) allowed people with specific access permissions to upload a file with multiple extensions (like .php.jpg) that could be access...

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, the underlying software of the popular website building platform, contains a vulnerability that could allow malicious web scripts to be executed when someone views a comment. The vuln...

    Read More
  • Input validation vulnerability in WordPress 2.0.11

    Fixed

    Hackers have found a way to take control of a website's administrator account in versions of WordPress 2.0.11 and earlier. This would allow them to move comments to the moderation list without the adm...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    If someone has the version of WordPress before 5.5.2

    Read More
  • Input validation vulnerability in WordPress 2.0.11

    Fixed

    There is a security flaw in WordPress 2.2.1 that allows people with administrator accounts to send commands to certain pages

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 2.0.5

    Fixed

    The versions of WordPress from 2.0.2 to 2.0.5 have a security vulnerability that could allow attackers to discover the location of the website. This could be done by requesting certain files such as 4...

    Read More
  • Input validation vulnerability in WordPress 2.0.5

    Fixed

    Prior to version 2.0.6 of WordPress

    Read More
  • Input validation vulnerability in WordPress 2.2

    Fixed

    Cross-site scripting (XSS) is a vulnerability that affects WordPress when custom 404 pages that call get_sidebar are used. This vulnerability allows attackers to inject malicious web scripts or HTML i...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    If you have a WordPress website running version 5.5.2 or earlier

    Read More
  • Access violation vulnerability in WordPress 3.3.1

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 1.5.1.2

    Fixed

    WordPress 1.5.1.2 and earlier versions have a security flaw which allows attackers to access and modify the contents of an email sent to someone who has forgotten their password. The attackers can do ...

    Read More
  • Input validation vulnerability in WordPress 3.3.3

    Fixed

    Cross-site scripting (XSS) is a type of security vulnerability that allows malicious attackers to inject code

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a vulnerability found in WordPress before version 4.7.1. It allows malicious attackers to inject malicious code such as web scripts or HTML into websites through a crafte...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Output validation vulnerability in WordPress 3.1.2

    Fixed

    WordPress versions 3.1 before 3.1.3 and 3.2 before Beta 2 are not secure enough to protect against clickjacking attacks

    Read More
  • Access violation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, the software that powers millions of websites, is vulnerable to a type of cyber attack known as Information Disclosure. This type of attack can lead to attackers accessing the email a...

    Read More
  • Weak configuration vulnerability in WordPress 2.6.1

    Fixed

    PHP 5.2.6 includes two functions

    Read More
  • Access violation vulnerability in WordPress 3.1.2

    Fixed

    WordPress versions 3.1 before 3.1.3 and 3.2 before Beta 2 have a security vulnerability that could allow hackers to access sensitive data. This vulnerability is related to the file ""wp-includes/post....

    Read More
  • Input validation vulnerability in WordPress 1.2.1

    Fixed

    A security vulnerability was discovered in the WordPress 1.2 web application that allowed remote attackers to manipulate the HTML content from the server. This was possible by exploiting a flaw in the...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.9.9 and 5.x before 5.0.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.4 are at risk for having malicious JavaScript inserted into them

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 4.5

    Fixed

    Before version 4.5 of WordPress

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core

    Read More
  • Input validation vulnerability in WordPress 2.0.9

    Fixed

    WordPress versions 2.0.9 and earlier have security flaws that allow hackers to insert malicious code into websites. This malicious code can be inserted by exploiting the ""popuptitle parameter"" on th...

    Read More
  • Authentication vulnerability in WordPress 2.3.1

    Fixed

    Wordpress versions 1.5 through 2.3.1 use a method to store passwords that makes it possible for attackers to get around the authentication process. This is done by taking the MD5 hash of a password fr...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security flaw in WordPress before version 4.4.2 allowed attackers to redirect users to malicious websites. This was done by sending a misformed URL that tricked the WordPress software into sending t...

    Read More
  • Input validation vulnerability in WordPress 1.2

    Fixed

    Wordpress 1.2 has multiple security issues that allow hackers to remotely add unauthorized web script and HTML to certain features. These features include wp-login.php

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A type of attack called cross-site request forgery (CSRF) was discovered in versions of WordPress before 4.7.1. This type of attack allowed remote attackers to gain control of another person's account...

    Read More
  • Input validation vulnerability in WordPress 2.6.4

    Fixed

    WordPress is a website platform software that had a vulnerability before version 2.6.5. This vulnerability could allow a remote attacker to inject malicious code

    Read More
  • Code execution vulnerability in WordPress 2.2.1

    Fixed

    WordPress

    Read More
  • Weak configuration vulnerability in WordPress informational

    Fixed

    WordPress versions up to and including 4.8.2 use an insecure password hashing algorithm. This means that if an attacker can get access to the hash values, they can easily figure out what the plain te...

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability that allows remote attackers to inject malicious code (such as web script or HTML) into websites or web applications. This vulnerability was ident...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 4.9.1

    Read More
  • Input validation vulnerability in WordPress 3.5

    Fixed

    Cross-site scripting (XSS) is a type of computer security vulnerability that allows malicious attackers to inject code (such as web scripts or HTML) into the Plupload.as feature of Moxiecode plupload

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, the software that runs the website, has a security vulnerability. This means that it is possible for an unauthenticated user to perform certain actions on the website under the identi...

    Read More
  • Access violation vulnerability in WordPress 4.6

    Fixed

    In WordPress versions before 4.6

    Read More
  • Input validation vulnerability in WordPress 2.0.1

    Fixed

    Hackers can exploit weaknesses in WordPress versions 2.0.1 and earlier to insert malicious code into the ""post comment"" feature. This code could then be seen by other users when they view the commen...

    Read More
  • Access violation vulnerability in WordPress 2.8.3

    Fixed

    In WordPress 2.8.3 and earlier

    Read More
  • Input validation vulnerability in WordPress 0.70

    Fixed

    A security issue has been identified in WordPress 0.70 which allows attackers to remotely execute malicious code when a specific file is accessed. This malicious code can be used to access sensitive i...

    Read More
  • Access violation vulnerability in WordPress 2.7.1

    Fixed

    WordPress 2.7.1 has a security issue that allows people who read the HTML source code of a post to find out the username of the author. This could potentially lead to the author's information being ac...

    Read More
  • Output validation vulnerability in WordPress 3.6

    Fixed

    WordPress versions before 3.6.1 have a security issue which could allow remote attackers to run code on your website. This issue is related to how WordPress checks if data has been modified or not. If...

    Read More
  • Input validation vulnerability in WordPress 4.6

    Fixed

    A vulnerability in WordPress

    Read More
  • Access violation vulnerability in WordPress 3.5.1

    Fixed

    WordPress versions before 3.5.2 have a security issue which allows people with access to the website

    Read More
  • Access violation vulnerability in WordPress 3.5.1

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.4 have a security problem due to the way Windows paths are handled when certain types of URLs are validated. This vulnerability is called a Server Side Request Forgery (S...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before WordPress version 4.9.5

    Read More
  • Input validation vulnerability in WordPress 2.8.1

    Fixed

    Hackers can use a security flaw in WordPress versions before 2.8.2 to insert malicious code into the administrator interface of a website. This malicious code could be used to take control of the webs...

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    Before version 3.5.2 of WordPress

    Read More
  • Denial of Service vulnerability in WordPress 3.1.1

    Fixed

    A security issue in WordPress versions before 3.1.1 could allow a malicious party to cause a crash by including a crafted URL in a comment. A function in WordPress (make_clickable) did not properly ch...

    Read More
  • Input validation vulnerability in WordPress 2.6

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 2.0.2

    Fixed

    WordPress 2.0.2 and earlier versions contain a security issue that allows remote attackers to run malicious code on the system. Attackers can do this by entering a special combination of characters an...

    Read More
  • Input validation vulnerability in WordPress 4.0.3

    Fixed

    Cross-site scripting (XSS) is a type of security vulnerability that affects WordPress before version 4.2.1. An attacker can insert malicious code

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions prior to 4.9.9 and 5.0.1

    Read More
  • Input validation vulnerability in WordPress 2.8.1

    Fixed

    A security risk was discovered in the wp-admin/upgrade.php file of WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions released before 5.2.4 have a security issue that could allow someone to access data without permission. The problem is that the software doesn't check if a URL is valid by looking a...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress is a software used to create websites and blogs. Before version 4.8.2

    Read More
  • Access violation vulnerability in WordPress 2.1

    Fixed

    WordPress is vulnerable to a security flaw that could let malicious attackers find out if certain files exist

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    The jquery-plugin-query-object 2.2.3 software contains a security vulnerability which can be exploited by a malicious user. This vulnerability allows the malicious user to add their own properties to ...

    Read More
  • Input validation vulnerability in WordPress 2.0.2

    Fixed

    WordPress versions before 2.0.2 had security problems that let hackers insert their own code into webpages. This code could be used to cause harm or to do things that the website owner did not want.

    Read More
  • Input validation vulnerability in WordPress 3.4

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 2.0.9

    Fixed

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Attackers are able to execute dangerous commands on a website running WordPress (version 4.2.3 or earlier) by sending specially crafted comments. These commands can allow attackers to access informati...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A vulnerability in the media-playlists feature in WordPress versions 3.9.x before 3.9.3 and 4.x before 4.0.1 could allow someone to inject malicious code (such as web script or HTML) into websites usi...

    Read More
  • Input validation vulnerability in WordPress 2.1.1

    Fixed

    WordPress 2.1.1 and earlier versions have a security flaw called cross-site request forgery (CSRF) vulnerability in the AdminPanel. This vulnerability could allow remote attackers to do actions as adm...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions released before 5.2.3 had a security flaw that allowed malicious code to be inserted into the website through the preview feature of a shortcode.

    Read More
  • Input validation vulnerability in WordPress 3.5

    Fixed

    WordPress versions before 3.5.1 have a security issue in their XMLRPC API that allows malicious actors to send HTTP requests to internal servers and conduct port scanning. This is done by using a sour...

    Read More
  • Input validation vulnerability in WordPress 2.0.6

    Fixed

    In WordPress 2.0.6 and earlier

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.9.9 and 5.x before 5.0.1

    Read More
  • Input validation vulnerability in WordPress 3.7.37

    Fixed

    WordPress is a free and powerful system used to create and manage content on websites. Unfortunately

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions 4.9.6 and earlier have a vulnerability that allow users with certain roles (Author

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability that allows an attacker to inject malicious code into a website. In this case

    Read More
  • Access violation vulnerability in WordPress 3.1.1

    Fixed

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    There is a vulnerability in WordPress versions released before 5.2.3 which makes it possible for someone to insert malicious code into comments that are stored on the website.

    Read More
  • Denial of Service vulnerability in WordPress 3.5.2

    Fixed

    WordPress 3.5.1 contains a file

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 5.5.2

    Read More
  • Access violation vulnerability in WordPress 1.5.1.2

    Fixed

    WordPress versions 1.5.1.2 and earlier have a security vulnerability that allows attackers to gain access to sensitive information. This can be done by either sending a direct request to the menu-head...

    Read More
  • Input validation vulnerability in WordPress 2.2

    Fixed

    WordPress 2.2 has a security hole that allows remote users who are logged in to execute unauthorized commands through a parameter in the XML RPC wp.suggestCategories methodCall. This vulnerability is ...

    Read More
  • Denial of Service vulnerability in WordPress 2.0.4

    Fixed

    WordPress versions before 2.0.5 have a security vulnerability that allows remote authenticated users to crash the application. This is done by sending a string that either contains a malformed or very...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    There was an issue in WordPress which allowed someone to create a link to an external website that

    Read More
  • Input validation vulnerability in WordPress 5.8 beta 1

    Fixed

    WordPress is a free program that allows users to create and manage their own websites. In the latest version of WordPress (5.8 beta 1)

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.8.3 have a security vulnerability that may allow hackers to inject malicious code into websites in the form of plugins and themes. This is done by using a special method ca...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions 3.7.4

    Read More
  • Input validation vulnerability in WordPress 5.4.7

    Fixed

    WordPress is a free and popular tool used to create websites and blogs. It was recently discovered that users who don't have certain permissions (like a contributor/author) could potentially bypass ce...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress recently released a fix in version 5.4.1 to address a vulnerability that could cause some previously public posts to be disclosed without authentication. In addition to 5.4.1

    Read More
  • Input validation vulnerability in WordPress 3.3.1

    Fixed

    There is a security vulnerability in the WordPress software before version 3.3.2 that could potentially have an unknown harmful effect. The vulnerability is located in a file called wp-includes/js/swf...

    Read More
  • Input validation vulnerability in WordPress 3.7.37

    Fixed

    WordPress is a free and easy-to-use website builder. A serious security issue was found that could allow someone to bypass certain security measures

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, in versions up to 6.0.2, has a security vulnerability that could allow users with specific access to the WordPress post and page editor, such as Authors, Contributors, and Editors, to...

    Read More
  • Weak configuration vulnerability in WordPress 4.4

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 2.0.6

    Fixed

    WordPress versions 2.0.6 and 2.1Alpha 3 have a security issue where attackers can access sensitive information from the website. This is done by using an invalid ""m[]"" parameter which can reveal the...

    Read More
  • Input validation vulnerability in WordPress 2.0

    Fixed

    A security flaw in WordPress versions 2.0 up to 2.0.9 and versions 2.1 up to 2.1.1 allowed an attacker to insert malicious code into a website. This could be done by sending a specially crafted reques...

    Read More
  • Input validation vulnerability in WordPress 3.7.37

    Fixed

    WordPress is a free and popular website-building service that is used to create and manage websites. A security vulnerability was recently discovered in WordPress versions 3.7.37 and older. This vulne...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.5.2 have a bug in the code responsible for determining if WordPress is already installed. This bug allows an attacker to start a new installation of WordPress

    Read More
  • Access violation vulnerability in WordPress 3.6

    Fixed

    In WordPress before version 3.6.1

    Read More
  • Denial of Service vulnerability in WordPress 3.7

    Fixed

    The Incutio XML-RPC Library

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.4.1 had a security issue where a malicious user could execute JavaScript code in the Customizer's navigation section. This issue has been fixed in WordPress 5.4.1

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress versions before 3.6.1 did not block people from uploading certain types of files

    Read More
  • Input validation vulnerability in WordPress 2.2

    Fixed

    WordPress versions before 2.2.1 and WordPress MU versions before 1.2.3 had a security flaw that allowed a user who was already logged in to upload and run any PHP code. This was done by creating a pos...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 3.9.2 had a security flaw that made it easier for attackers to get around the protection that was in place to prevent unwanted access. This was because it didn't always separ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability that can be exploited by hackers. In WordPress before version 4.2.4

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    WordPress versions before 3.5.1 have security flaws that could allow attackers to add malicious code to a website. This code could be in the form of a script or HTML and could be added using the galle...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into websites. In WordPress before version 4.7.2

    Read More
  • Authentication vulnerability in WordPress 3.7

    Fixed

    The versions of WordPress before 3.7.2 and 3.8.2 have a vulnerability which makes it easier for attackers to gain access to a website with a forged authentication cookie. The issue is in the wp_valida...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 4.9.1

    Read More
  • Input validation vulnerability in WordPress 2.1.1

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a type of security vulnerability that affects websites. In WordPress before version 4.5.3

    Read More
  • Input validation vulnerability in WordPress 2.0.9

    Fixed

    WordPress versions before 2.0.10 RC2 and 2.1.3 RC2 contain a security vulnerability that allows someone who is remotely logged in with certain privileges to add malicious code to the WordPress website...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress MU 1.2.5

    Fixed

    Wordpress versions before 2.2.3 and Wordpress multi-user (MU) versions before 1.2.5a have security vulnerabilities that allow people from outside to run commands on the Wordpress database. This is don...

    Read More
  • Access violation vulnerability in WordPress 2.2.2

    Fixed

    Wordpress versions before 2.2.3 have a security issue where attackers can access certain restricted pages. This is caused by a problem in the wp-includes/vars.php file

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.1.1 have a security flaw that could allow someone who is not authenticated to take control of the website and make changes to the code. This is due to two problems - the we...

    Read More
  • Access violation vulnerability in WordPress 4.7.20

    Fixed

    WordPress is a type of software used to create websites. It is open to the public

    Read More
  • Access violation vulnerability in WordPress 3.0.2

    Fixed

    In WordPress versions before 3.0.2

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions prior to 4.7.3

    Read More
  • Weak configuration vulnerability in WordPress 4.8.2

    Fixed

    WordPress 4.8.2 does not adequately secure user accounts that are not yet activated. It stores the passwords for these accounts in plain text

    Read More
  • Input validation vulnerability in WordPress 3.0.2

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability in WordPress before version 3.0.2 that could allow attackers to add their own code

    Read More
  • Input validation vulnerability in WordPress 2.0.10

    Fixed

    Read More
  • Input validation vulnerability in WordPress 2.8.5

    Fixed

    Cross-site scripting (XSS) is a security vulnerability that allows malicious users to inject code

    Read More
  • Input validation vulnerability in WordPress 4.7.20

    Fixed

    WordPress is a type of software that helps people create websites. It has a feature called the Media Library that lets people upload files. Unfortunately

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    WordPress before version 3.5.2 was vulnerable to a security issue that allowed someone to send malicious requests from an external source to an internal server. This issue is similar to one identified...

    Read More
  • Output validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions 3.9.x before 3.9.2

    Read More
  • Access violation vulnerability in WordPress 2.8.2

    Fixed

    WordPress versions before 2.8.3 have a security vulnerability that allows attackers to gain access to certain privileges by directly requesting certain pages within the ""wp-admin"" folder. The pages ...

    Read More
  • Output validation vulnerability in WordPress 4.9

    Fixed

    WordPress versions before 4.9 have an issue that could allow someone to run code on the website remotely. This could be done by an authorized user uploading a thumbnail. It is uncertain if extra plugi...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.3

    Read More
  • Information leakage vulnerability in WordPress 3.7

    Fixed

    The version of WordPress before 4.2.4 does not use a secure method to compare widgets

    Read More
  • Access violation vulnerability in WordPress 2.3.2

    Fixed

    WordPress

    Read More
  • Denial of Service vulnerability in WordPress 2.1

    Fixed

    WordPress versions before 2.1 have a function called wp_remote_fopen

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site request forgery (CSRF) is a vulnerability in a feature of WordPress before version 4.7.1 that allows remote attackers to gain access to someone else's account without their knowledge. This ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In versions of WordPress prior to 5.4.2

    Read More
  • Input validation vulnerability in WordPress 2.2.1

    Fixed

    WordPress 2.2.1 has security flaws that could let someone with an Administrator account on the website add malicious code to the site. This code can be added either when changing settings in the Admin...

    Read More
  • Access violation vulnerability in WordPress 2.0.4

    Fixed

    Before version 2.0.5 of WordPress

    Read More
  • Input validation vulnerability in WordPress 2.0

    Fixed

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A vulnerability in a file called ""wp-includes/class-wp-query.php"" in a program called WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions 3.7 to 5.3.0

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.5.2 had a security vulnerability that allowed hackers to insert malicious code into posts by using certain words in the post title

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress MU 1.3.1

    Fixed

    In WordPress MU before version 1.3.2 and in WordPress 2.3.2 and earlier

    Read More
  • Input validation vulnerability in WordPress 1.5.2

    Fixed

    A security weakness in WordPress version 1.5.2 and possibly earlier versions before 2.0 could allow someone to send malicious code through the User-Agent field in an HTTP header associated with a comm...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.9.9 and 5.x before 5.0.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.4.1 contained security flaws that allowed a malicious online user to insert harmful code into a website by exploiting weaknesses in the wp-includes/class-wp-theme.php file....

    Read More
  • Input validation vulnerability in WordPress 3.3.1

    Fixed

    Cross-site scripting

    Read More
  • Authentication vulnerability in WordPress 3.7

    Fixed

    In WordPress versions affected by this issue

    Read More
  • Input validation vulnerability in WordPress 3.1.2

    Fixed

    WordPress versions 3.1 and 3.2 before Beta 2 have a file upload feature that could be vulnerable to attack when used on certain hosts. It is unknown how this vulnerability could be exploited

    Read More
  • Input validation vulnerability in WordPress 3.1.2

    Fixed

    WordPress versions 3.1 before 3.1.3 and 3.2 before Beta 2 have a security issue that could allow hackers to use malicious code to access your website. This issue is related to something called ""Taxon...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a security vulnerability that can be found in WordPress before version 3.9.2 when it is used in a ""Multisite"" configuration. This vulnerability could allow a remote aut...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A vulnerability in versions of WordPress before 3.7.5

    Read More
  • Access violation vulnerability in WordPress 2.0.4

    Fixed

    An issue in WordPress before version 2.0.5 allowed people with access to the system to read or replace files on it. This was possible by entering certain commands as part of a GET request.

    Read More
  • Denial of Service vulnerability in WordPress 4.6

    Fixed

    A security flaw in the version 4.5.3 of the WordPress website management software allows people with a remote account to cause a service outage or read certain text files. This is achieved by adding a...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Attackers can use a security flaw in WordPress before version 4.2.4 to prevent administrators from being able to edit posts. They can do this by sending a specific request which will lock the post

    Read More
  • Denial of Service vulnerability in WordPress 2.8.4

    Fixed

    WordPress before version 2.8.5 has a security issue which could allow remote attackers to cause a denial of service. This could lead to an increased amount of CPU usage and cause the server to hang. T...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 5.4.2

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    WordPress versions before 3.5.2 are vulnerable to having malicious code inserted into them by remote attackers. This code could be web scripts or HTML

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    Moxieplayer

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security flaw was discovered in an older version of WordPress (before 4.2.2)

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In versions of WordPress before 4.9.9 and 5.x before 5.0.1

    Read More
  • Access violation vulnerability in WordPress 5.4.7

    Fixed

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress version 4.7.2 and before

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions 3.7.5

    Read More
  • Information leakage vulnerability in WordPress MU 2.8

    Fixed

    If someone tries to log in to a WordPress or WordPress MU website that is running a version earlier than 2.8.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress users who don't have as much access (like contributors) can add JavaScript code to the block editor using a certain input. If an administrator looks at the post in the editor

    Read More
  • Access violation vulnerability in WordPress MU 2.8

    Fixed

    WordPress and WordPress MU (versions before 2.8.1) have a security vulnerability that allows attackers to get access to sensitive information. The vulnerability can be exploited by sending a direct re...

    Read More
  • Input validation vulnerability in WordPress 3.4.1

    Fixed

    WordPress versions 3.4.x before 3.4.2 have a security vulnerability when the multisite feature is enabled. This vulnerability allows remote authenticated users to bypass access restrictions and perfor...

    Read More
  • Input validation vulnerability in WordPress 1.5.1.1

    Fixed

    There is a security issue in WordPress 1.5.1 that allows people who are not authorized to do so to execute certain commands on the WordPress website. This vulnerability is related to the $cat_ID varia...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 4.9.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Input validation vulnerability in WordPress 4.8.1

    Fixed

    WordPress

    Read More
  • Information leakage vulnerability in WordPress 3.1.2

    Fixed

    WordPress versions 3.1 up to 3.1.3 and 3.2 up to Beta 2 could be used by attackers to figure out the usernames of people who do not have permission to access the website.

    Read More
  • Input validation vulnerability in WordPress 2.0.2

    Fixed

    In WordPress 2.0.2

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    If you had a WordPress website and were using an affected version

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security issue was found in WordPress versions released before 3.7.5

    Read More
  • Input validation vulnerability in WordPress 5.7.5

    Fixed

    WordPress versions before 5.8 have a security issue that can make it easier for malicious people to gain access to websites using WordPress. This can happen if the website uses a plugin that has the s...

    Read More
  • Denial of Service vulnerability in WordPress 2.0.3

    Fixed

    A security issue in the WordPress 2.0.3 and earlier versions allows people from a remote location to access and delete any file

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before WordPress version 4.9.5

    Read More
  • Access violation vulnerability in WordPress 5.8 beta 1

    Fixed

    WordPress is a free website-building system that is open for anyone to use. It was written in a computer language called PHP

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.2.3 have a security issue that allows users with limited access rights to bypass restrictions and create drafts. This issue was demonstrated by using a post-quickdraft-save...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 5.2.4

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions 3.7.2 and earlier

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Prior to version 5.2.4 of WordPress

    Read More
  • Code execution vulnerability in WordPress 2.1.1

    Fixed

    WordPress version 2.1.1 was infected with dangerous code that gave hackers a way to get back into WordPress websites.

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions prior to 5.4.1

    Read More
  • Input validation vulnerability in WordPress 3.5.1

    Fixed

    WordPress versions before 3.5.2 have a security vulnerability that allows someone from outside the website to access and read private files. This is done by using a response from an XML provider that ...

    Read More
  • Input validation vulnerability in WordPress 2.1.3

    Fixed

    WordPress 2.1.2 and possibly earlier versions have a security issue which allows remote users who are logged in to run dangerous commands through a string in an XML RPC mt.setPostCategories method cal...

    Read More
  • Input validation vulnerability in WordPress 2.0.10

    Fixed

    A security flaw in WordPress 2.2.1 allows malicious actors to insert dangerous code into the website. This code could be used to steal information or take control of the website. It affects the ""Temp...

    Read More
  • Access violation vulnerability in WordPress 3.0.6

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.3 had a security flaw that allowed people with access to the website to create posts or pages with malicious code that could harm other users. This is fixed in version 5....

    Read More
  • Access violation vulnerability in WordPress 2.0.11

    Fixed

    Older versions of WordPress (before 2.0.11) have a security vulnerability that could allow someone to find out sensitive information. If a certain type of malicious person enters a blank value into a ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A vulnerability in a software called Plupload

    Read More
  • Output validation vulnerability in WordPress 3.7

    Fixed

    Requests is a software library written in the programming language PHP. There was an issue in the library that caused it to mishandle certain types of data. This issue has been fixed

    Read More
  • Input validation vulnerability in WordPress 3.6

    Fixed

    In WordPress versions before 3.6.1

    Read More
  • Input validation vulnerability in WordPress 3.3.1

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 1.5.2

    Fixed

    Hackers can gain access to sensitive information through WordPress versions before 1.5.2. This is done by sending a request to certain files

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions 3.7 to 5.3.0

    Read More
  • Output validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.5.2 had a problem with how it handled requests to be deserialized in a certain file in the software.

    Read More
  • Input validation vulnerability in WordPress 5.0.2

    Fixed

    WordPress versions up to 5.0.3 have a security vulnerability that allows an attacker to write an output image to a directory of their choice. To do this

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress before version 4.7.3 had a security vulnerability called cross-site request forgery (CSRF). This vulnerability could cause too many requests to be sent to the server

    Read More
  • Input validation vulnerability in WordPress 3.0.1

    Fixed

    Someone with access to a WordPress website before version 3.0.2 could use a certain part of the website to run their own code

    Read More
  • Input validation vulnerability in WordPress 2.0.2

    Fixed

    Attackers can use a security flaw in the wp-register.php file of WordPress 2.0 and 2.0.1 to insert malicious code into a website. This code can be in the form of web scripts or HTML and is inserted vi...

    Read More
  • Access violation vulnerability in WordPress MU 2.8

    Fixed

    In WordPress and WordPress MU before 2.8.1

    Read More
  • Input validation vulnerability in WordPress 5.4.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.1.2

    Fixed

    There is a security issue in versions of WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 which could potentially allow unauthorized access to the system. It is not known what the exact impact of this...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.9.9 and 5.x before 5.0.1 have a security vulnerability that allows someone with author privileges to execute arbitrary code. This is done by changing a Post Meta entry to a...

    Read More
  • Input validation vulnerability in WordPress 2.5.1

    Fixed

    WordPress 2.5.1 and earlier versions have a security vulnerability that could let someone with access to the dashboard upload and run a malicious file. This could allow them to gain control of the web...

    Read More
  • Input validation vulnerability in WordPress 3.3.1

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 2.0.5

    Fixed

    WordPress 2.0.5 contains a security flaw that allows people from outside the website to insert malicious code into it. This code can be used to alter the website and make it do things that it was not ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions 4.9.9 and earlier and 5.x before 5.0.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability that allows attackers to inject malicious code through websites. This vulnerability was found in WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.2.3 have a security vulnerability which can allow malicious users with certain privileges to inject harmful web scripts or HTML into the site. This involves the use of a sp...

    Read More
  • Denial of Service vulnerability in WordPress 3.7

    Fixed

    The Incutio XML-RPC Library

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 5.2.3

    Read More
  • Input validation vulnerability in WordPress 2.5

    Fixed

    A security weakness in WordPress 2.5 could let people from other websites put their own code

    Read More
  • Input validation vulnerability in WordPress 3.1

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 2.9.2

    Fixed

    WordPress 2.9

    Read More
  • Input validation vulnerability in WordPress 3.6

    Fixed

    WordPress versions prior to 3.6.1 do not check URLs carefully enough before using them to redirect to another website. This can be used by malicious attackers to redirect people away from the intended...

    Read More
  • Access violation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core is vulnerable to a potential information leak through its REST-API in versions up to 6.0.3. If you have access to certain details such as terms and tags for a post, it is possible to s...

    Read More
  • Denial of Service vulnerability in WordPress 3.7

    Fixed

    A security vulnerability in older versions of WordPress (3.7.5

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In some older versions of WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.3 have a security vulnerability that could allow hackers to take control of a website. This vulnerability has to do with how URLs are handled

    Read More
  • Input validation vulnerability in WordPress 3.0.2

    Fixed

    There is a security issue in WordPress versions before 3.0.2 which allows malicious websites to inject dangerous code into a WordPress site. This is done by providing a specially crafted error message...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.3

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.1.2 had security vulnerabilities which allowed attackers to insert malicious code into a website. This code could be written in a comment and was triggered by either a four...

    Read More
  • Access violation vulnerability in WordPress 2.9.2

    Fixed

    WordPress versions 2.9.2 and 3.0.4 are vulnerable to attackers who can gain access to sensitive information by directly requesting a particular .php file. If they do this

    Read More
  • Access violation vulnerability in WordPress 4.0

    Fixed

    WordPress 3.4.2 contains a security issue that makes it easier for hackers to access or change data. When an administrator logs out

    Read More
  • Access violation vulnerability in WordPress 1.5.1

    Fixed

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    A security vulnerability was discovered in the XMLRPC subsystem of WordPress versions before 4.3.1. This vulnerability allows users who are logged into the site to bypass intended restrictions on post...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 3.9.2

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core is a software system that is vulnerable to a type of attack called Stored Cross-Site Scripting. This type of attack occurs when an attacker with access to the theme customizer (such as...

    Read More
  • Access violation vulnerability in WordPress 2.3.3

    Fixed

    WordPress versions 2.3.3 and earlier

    Read More
  • Input validation vulnerability in WordPress 2.0.5

    Fixed

    Cross-site scripting (XSS) is a vulnerability in the protection scheme used by WordPress before version 2.0.6. It allows malicious people to insert unwanted web scripts or HTML into websites through a...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    If you are using an affected version of WordPress

    Read More
  • Input validation vulnerability in WordPress 2.3.2

    Fixed

    WordPress 2.3.2 has weaknesses that could allow a remote attacker to insert their own web script or HTML code into the website. The attacker can do this by using the ""inviteemail"" parameter in the "...

    Read More
  • Input validation vulnerability in WordPress 1.5.1.2

    Fixed

    WordPress 1.5.1.2 and earlier versions have multiple security issues that allow people to insert malicious code or content into webpages. This code or content

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 3.4.1

    Fixed

    In WordPress 3.4.2 and earlier

    Read More
  • Output validation vulnerability in WordPress 2.6.1

    Fixed

    WordPress versions before 2.6.2 have a security issue where a remote attacker can reset the password of any user on the website. The attacker can do this by registering a username similar to the usern...

    Read More
  • Weak configuration vulnerability in WordPress 2.6

    Fixed

    In WordPress versions before 2.6.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security issue has been identified in certain versions of WordPress that could allow someone to run malicious code on a website if they had the ability to upload files. The versions affected are 5.3...

    Read More
  • Access violation vulnerability in WordPress 2.4

    Fixed

    WordPress versions 2.2.x and 2.3.x have a vulnerability which allows malicious actors to gain access to sensitive information. This is done by sending a special request to the default web address with...

    Read More
  • Access violation vulnerability in WordPress 3.3.3

    Fixed

    WordPress before version 3.3.3 had a security flaw that allowed people to access sensitive information or get around restrictions on what kind of media they could attach to posts by using a certain va...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    An issue was found in WordPress versions prior to 3.7.5

    Read More
  • Access violation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core is an online platform that is vulnerable to a security issue. In versions prior to 6.0.3, users with access to terms and tags, such as a contributor, could find out details about posts...

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core versions up to 6.0.2 have a security vulnerability that can be exploited if an attacker injects malicious content into the code of a plugin. This malicious content will trigger when so...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Before version 4.8.2

    Read More
  • Access violation vulnerability in WordPress 3.1.2

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions prior to 4.6.1 had a security vulnerability which could allow malicious actors to inject malicious code into a website. An attacker could achieve this by convincing an administrator...

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    A security problem was found in the way WordPress 4.7 and earlier versions handled information about who wrote a post. An attacker could use this security problem to gain access to sensitive informati...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.3 had a security flaw in the way it handled media uploads. This flaw could allow attackers to put malicious code into the website.

    Read More
  • Access violation vulnerability in WordPress 2.0.4

    Fixed

    There are security issues with WordPress versions before 2.0.4. It is not known what the effects of these problems are or how they can be used to attack a computer remotely. It is unclear how these is...

    Read More
  • Input validation vulnerability in WordPress 2.3.1

    Fixed

    WordPress 2.3.1 and earlier versions have a security vulnerability that allows hackers to execute malicious commands on the website. This vulnerability is related to the ""s"" parameter in the ""wp-in...

    Read More
  • Output validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.9.9 and 5.x before 5.0.1

    Read More
  • Input validation vulnerability in WordPress 3.0.3

    Fixed

    Multiple security holes in KSES

    Read More
  • Access violation vulnerability in WordPress 2.1.2

    Fixed

    WordPress 2.1.2 (and possibly earlier versions) has an issue where users who have the ""contributor"" role can access a feature that they are not supposed to have access to. This feature

    Read More
  • Input validation vulnerability in WordPress 2.2.1

    Fixed

    WordPress versions before 2.2.2 have vulnerabilities that allow attackers to redirect visitors to other websites and potentially access sensitive information. This could be done by manipulating the _w...

    Read More
  • Denial of Service vulnerability in WordPress 2.7

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress MU 1.2.5

    Fixed

    Wordpress versions 2.2.3 and before

    Read More
  • Access violation vulnerability in WordPress 3.0.4

    Fixed

    WordPress before version 3.0.5 contained a problem in its media uploader where remote users who were authenticated

    Read More
  • Authentication vulnerability in WordPress 4.7.4

    Fixed

    WordPress versions 4.7.4 and below have a security vulnerability that makes it easier for hackers to access someone's account. This is due to the way WordPress handles password reset emails. A hacker ...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A vulnerability in a software program called Plupload

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    The WordPress REST API in versions 4.7.x before 4.7.2 had a vulnerability where an attacker could modify arbitrary pages without needing an integer identifier. This was done by making a request to the...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security issue in the version of WordPress before 4.3.1 allowed people with access to the user list table to add malicious code to the website. This malicious code could be used to cause harm to the...

    Read More
  • Input validation vulnerability in WordPress 3.0.4

    Fixed

    WordPress versions before 3.0.5 had several security issues that could allow remote users with an account to insert malicious web scripts or HTML code into the content. This was possible through the Q...

    Read More
  • Input validation vulnerability in WordPress 4.5

    Fixed

    Cross-site scripting (XSS) is a security vulnerability that can be found in certain versions of WordPress before version 4.5. This vulnerability allows someone to inject malicious web scripts or HTML ...

    Read More
  • Access violation vulnerability in WordPress 3.0.1

    Fixed

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security flaw in versions of WordPress before 4.2.4 allowed attackers to insert malicious code into a website using a feature called refreshAdvancedAccessibilityOfItem in wp-admin/js/nav-menu.js. Th...

    Read More
  • Input validation vulnerability in WordPress 4.9.8

    Fixed

    WordPress is a popular website platform

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 5.2.4 have a security issue that can allow someone to control the content of the information that is stored when certain requests are made. This issue is related to a missing...

    Read More
  • Denial of Service vulnerability in WordPress 4.9.8

    Fixed

    In WordPress versions before 4.9.9

    Read More
  • Information leakage vulnerability in WordPress 2.0.5

    Fixed

    WordPress 2.0.5 and earlier has a security flaw that could allow remote attackers to find out sensitive information and use it to break into the system. This is done by looking at different error mess...

    Read More
  • Input validation vulnerability in WordPress 1.5.1

    Fixed

    WordPress 1.5 and earlier versions have security weaknesses that can allow attackers to run commands on the website. This is done by using the content or title of a post. This vulnerability is called ...

    Read More
  • Input validation vulnerability in WordPress 2.0.3

    Fixed

    Attackers can use a security weakness in WordPress 2.0 to insert malicious code into a website through the user_login parameter of the wp-register.php file. This malicious code can be used to damage t...

    Read More
  • Input validation vulnerability in WordPress 3.9.2

    Fixed

    OwnCloud Server versions before 5.0.15 and 6.0.2 have a vulnerability in the getID3() function that could allow someone to access and read files from a computer

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 5.3.1

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, the software used to create websites, is vulnerable to a security issue in versions up to 6.0.3. This means an attacker can redirect a victim to a malicious website if the victim clic...

    Read More
  • Input validation vulnerability in WordPress 3.3.2

    Fixed

    Plupload

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    People using WordPress before version 4.5.3 may be vulnerable to having their redirection restrictions bypassed by an attacker.

    Read More
  • Denial of Service vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Weak configuration vulnerability in WordPress 3.7

    Fixed

    A security vulnerability in WordPress versions before 4.7.1 made it easier for hackers to gain access to websites. This vulnerability was related to the way WordPress generated random numbers for keys...

    Read More
  • Access violation vulnerability in WordPress 2.0.3

    Fixed

    WordPress 2.0.3 has a security flaw that can be exploited by people with malicious intentions. They can make a direct request to certain files in the WordPress installation

    Read More
  • Access violation vulnerability in WordPress 3.4.2

    Fixed

    In WordPress versions before 3.4.2

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 5.3.1

    Read More
  • Access violation vulnerability in WordPress 2.8.2

    Fixed

    Wordpress versions before 2.8.3 had a security flaw that allowed people to make changes to the website without proper access. This could be done by sending a direct request to certain pages in the wp-...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress before version 4.4.2

    Read More
  • Input validation vulnerability in WordPress 1.5.1.3

    Fixed

    WordPress versions 1.5.1.2 and earlier contain a vulnerability that allows remote attackers to execute malicious code. This vulnerability is found in the XMLRPC server and is caused by input that is n...

    Read More
  • Access violation vulnerability in WordPress 3.0.2

    Fixed

    WordPress versions before 3.0.2 have a security issue in which a malicious user can bypass spam restrictions by creating a specially crafted URL. This URL can trigger a match to certain words

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.5.3 could be exploited by malicious individuals to gain access to sensitive information from a post's revision history. This vulnerability was present in the WordPress file...

    Read More
  • Input validation vulnerability in WordPress *

    Fixed

    WordPress

    Read More
  • Input validation vulnerability in WordPress 4.5

    Fixed

    WordPress is a content management system used by many websites. In versions before 4.5

    Read More
  • Information leakage vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core versions up to 6.0.3 had a security issue with how they handled user permissions. This fix was made to address two vulnerabilities in wp-mail.php and wp-trackback.php which could have ...

    Read More
  • Access violation vulnerability in WordPress 3.0.2

    Fixed

    WordPress

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    A security issue has been discovered in WordPress before version 4.6.1 that allows people who have been given access to the website to access files on the website that they should not be able to acces...

    Read More
  • Input validation vulnerability in WordPress 5.9.2

    Fixed

    WordPress Core versions 5.9 to 5.9.1 have a security vulnerability that can allow attackers to store malicious code on the website. This malicious code can be set in the 'isGlobalStylesUserThemeJSON'...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions prior to 4.7.3

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress

    Read More
  • Weak configuration vulnerability in WordPress 5.2

    Fixed

    WordPress Core in versions prior to 5.8.2 included an outdated security certificate, known as DST Root CA X3. This certificate is no longer actively used and does not pose any significant security ri...

    Read More
  • Input validation vulnerability in WordPress 4.9.6

    Open

    In WordPress 4.9.7, it is possible for a malicious user to upload a file that contains malicious code. This user would need to have access to the admin area and the capability to upload plugins. If a...

    Read More
  • Access violation vulnerability in WordPress 3.3.3

    Fixed

    In WordPress versions before 3.3.3

    Read More
  • Input validation vulnerability in WordPress 3.8.1

    Fixed

    WordPress Core, the software powering websites, had a security vulnerability in versions before 3.8.2 that allowed malicious administrative users to inject malicious code into the website. This code ...

    Read More
  • Authentication vulnerability in WordPress 2.5

    Fixed

    WordPress 2.5 has a security issue called ""cryptographic splicing"" where remote attackers can gain administrator privileges by registering usernames that begin with ""admin"". This is possible becau...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    Cross-site scripting (XSS) is a vulnerability that allows a remote attacker to insert malicious web scripts or HTML into an application. In the case of MediaElement.js before version 2.21.0

    Read More
  • Input validation vulnerability in WordPress MU 1.2.3

    Fixed

    WordPress 2.2.1 and WordPress MU 1.2.3 have a security vulnerability that allows people who are logged in to the system to upload and run malicious code. This bug is related to the wp_postmeta table a...

    Read More
  • Information leakage vulnerability in WordPress MU 2.8

    Fixed

    WordPress and WordPress MU before version 2.8.1 had a feature in their mail system that acted differently when someone asked for a password. Depending on whether or not the user account existed

    Read More
  • Access violation vulnerability in WordPress 2.0.1

    Fixed

    WordPress versions 2.0.1 and earlier contain security flaws that allow malicious individuals to access sensitive information on the website. Attackers can get to this information by directly requestin...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.3

    Read More
  • Input validation vulnerability in WordPress 0.72

    Fixed

    Hackers can use a vulnerability in log.header.php in WordPress 0.7 and earlier to run commands on a website. These commands can be used to access information that is not normally available.

    Read More
  • Authentication vulnerability in WordPress 3.7

    Fixed

    Older versions of the WordPress content management system (versions 3.7.5 and earlier

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions 3.7.5 and before

    Read More
  • Access violation vulnerability in WordPress 3.7

    Fixed

    WordPress versions released before 5.2.4 do not check if the person visiting the admin pages is who they say they are. This could potentially lead to a type of cyber attack known as Cross-Site Request...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    In WordPress versions before 4.7.5

    Read More
  • Input validation vulnerability in WordPress 2.3

    Fixed

    A security issue has been found in WordPress 2.3 that could allow someone to insert malicious code into the website. This code could be used to access sensitive information about the website

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core, up to version 6.0.2, is vulnerable to a form of attack called SQL Injection. This type of attack can be used by anyone who is logged in to WordPress and has a high-level of access, su...

    Read More
  • Input validation vulnerability in WordPress 4.1.34

    Fixed

    WordPress is a free and open-source website platform. It is written in a programming language called PHP and uses a database called MariaDB. There was an issue in one of the classes where it didn't sa...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress versions before 4.9.2 were vulnerable to a type of attack called cross-site scripting (XSS). This vulnerability was found in the Flash fallback files that are part of the MediaElement packag...

    Read More
  • Input validation vulnerability in WordPress 3.3

    Fixed

    Cross-site scripting (XSS) is a security vulnerability that can allow attackers to put malicious code on a website. In versions of WordPress 3.3.x before 3.3.1

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    WordPress Core in different versions prior to 5.9.2 and Gutenberg versions before 12.7.2 have a security vulnerability in the block editor, which could allow malicious web scripts to be injected in s...

    Read More
  • Input validation vulnerability in WordPress 3.6.1

    Fixed

    WordPress Core and the Gutenberg plugin for WordPress have a security vulnerability that could allow malicious web scripts to be injected onto webpages. This vulnerability affects versions of WordPre...

    Read More
  • Input validation vulnerability in WordPress 3.7

    Fixed

    A security flaw was found in a website file called Genericons before version 3.3.1

    Read More
  • Input validation vulnerability in SWFUpload (40 plugins affected)

    Fixed

    Cross-site scripting (XSS) is a type of vulnerability that allows attackers to inject malicious code into webpages. In the case of SWFUpload 2.2.0.1 and earlier, WordPress before 3.3.2, TinyMCE Image...

    Read More