Nxploited

132 exploits Active since Nov 2023
CVE-2026-1405 GITHUB CRITICAL python WORKING POC
Slider Future Plugin <1.0.5 - RCE
The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
10 stars
CVSS 9.8
CVE-2025-2005 NOMISEC CRITICAL WORKING POC
Etoilewebdesign Front End Users < 3.2.32 - Unrestricted File Upload
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
9 stars
CVSS 9.8
CVE-2025-3102 NOMISEC HIGH WORKING POC
SureTriggers - All-in-One Automation Platform < 1.0.78 - Authentication Bypass
The SureTriggers: All-in-One Automation Platform plugin for WordPress is vulnerable to an authentication bypass leading to administrative account creation due to a missing empty value check on the 'secret_key' value in the 'autheticate_user' function in all versions up to, and including, 1.0.78. This makes it possible for unauthenticated attackers to create administrator accounts on the target website when the plugin is installed and activated but not configured with an API key.
8 stars
CVSS 8.1
CVE-2025-2266 NOMISEC CRITICAL WORKING POC
Checkout Mestres do WP for WooCommerce <8.7.5 - Privilege Escalation
The Checkout Mestres do WP for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the cwmpUpdateOptions() function in versions 8.6.5 to 8.7.5. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
8 stars
CVSS 9.8
CVE-2025-7340 NOMISEC CRITICAL WORKING POC
Hasthemes Download Contact Form 7 Wid... - Unrestricted File Upload
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
7 stars
CVSS 9.8
CVE-2025-8723 NOMISEC CRITICAL WORKING POC
Cloudflare Image Resizing <1.5.6 - RCE
The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.
7 stars
CVSS 9.8
CVE-2025-3776 NOMISEC HIGH WORKING POC
WordPress <1.5 - RCE
The Verification SMS with TargetSMS plugin for WordPress is vulnerable to limited Remote Code Execution in all versions up to, and including, 1.5 via the 'targetvr_ajax_handler' function. This is due to a lack of validation on the type of function that can be called. This makes it possible for unauthenticated attackers to execute any callable function on the site, such as phpinfo().
7 stars
CVSS 8.3
CVE-2025-4334 NOMISEC CRITICAL WORKING POC
Najeebmedia Simple User Registration - Improper Privilege Management
The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator.
7 stars
CVSS 9.8
CVE-2025-6934 NOMISEC CRITICAL WORKING POC
Opal Estate Pro - Property Management and Submission <1.7.5 - Privi...
The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.
6 stars
CVSS 9.8
CVE-2025-12539 NOMISEC CRITICAL WORKING POC
WordPress TNC Toolbox: Web Performance <1.4.2 - Info Disclosure
The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.
6 stars
CVSS 10.0
CVE-2025-11749 NOMISEC CRITICAL WORKING POC
WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE
The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.
6 stars
CVSS 9.8
CVE-2025-47539 NOMISEC CRITICAL WORKING POC
Themewinter Eventin < 4.0.27 - Incorrect Privilege Assignment
Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue affects Eventin: from n/a through 4.0.26.
4 stars
CVSS 9.8
CVE-2025-39401 NOMISEC CRITICAL WORKING POC
Mojoomla WPAMS <44.0 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
4 stars
CVSS 10.0
CVE-2025-1306 NOMISEC HIGH WORKING POC
Spicethemes Newscrunch < 1.8.4.1 - CSRF
The Newscrunch theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.4. This is due to missing or incorrect nonce validation on the newscrunch_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
4 stars
CVSS 8.8
CVE-2025-10041 GITHUB CRITICAL python WORKING POC
Flex QR Code Generator <1.2.5 - File Upload
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
3 stars
CVSS 9.8
CVE-2025-5394 NOMISEC CRITICAL WORKING POC
Alone - Charity Multipurpose Non-profit WordPress Theme <7.8.3 - RCE
The Alone – Charity Multipurpose Non-profit WordPress Theme theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the alone_import_pack_install_plugin() function in all versions up to, and including, 7.8.3. This makes it possible for unauthenticated attackers to upload zip files containing webshells disguised as plugins from remote locations to achieve remote code execution.
3 stars
CVSS 9.8
CVE-2025-5288 NOMISEC CRITICAL WORKING POC
WP plugin <2.0.3 - Privilege Escalation
The REST API | Custom API Generator For Cross Platform And Import Export In WP plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the process_handler() function in versions 1.0.0 to 2.0.3. This makes it possible for unauthenticated attackers to POST an arbitrary import_api URL, import specially crafted JSON, and thereby create a new user with full Administrator privileges.
3 stars
CVSS 9.8
CVE-2025-23942 NOMISEC CRITICAL WORKING POC
NgocCode WP Load Gallery <2.1.6 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in NgocCode WP Load Gallery allows Upload a Web Shell to a Web Server. This issue affects WP Load Gallery: from n/a through 2.1.6.
3 stars
CVSS 9.1
CVE-2025-2294 NOMISEC CRITICAL WORKING POC
Kubio AI Page Builder <2.5.1 - Local File Inclusion
The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
3 stars
CVSS 9.8
CVE-2025-39436 NOMISEC CRITICAL WORKING POC
aidraw I Draw <1.0 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in aidraw I Draw allows Using Malicious Files. This issue affects I Draw: from n/a through 1.0.
3 stars
CVSS 9.1
CVE-2025-4190 NOMISEC HIGH WORKING POC
WordPress CSV Mass Importer <1.2 - Privilege Escalation
The CSV Mass Importer WordPress plugin through 1.2 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)
3 stars
CVSS 7.2
CVE-2024-9047 NOMISEC CRITICAL WORKING POC
Iptanus Wordpress File Upload < 4.24.12 - Path Traversal
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
3 stars
CVSS 9.8
CVE-2024-12209 NOMISEC CRITICAL WORKING POC
WP Umbrella: Update Backup Restore & Monitoring <2.17.0 - Local Fil...
The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
3 stars
CVSS 9.8
CVE-2025-8625 GITHUB CRITICAL python WORKING POC
Copypress Rest API <1.2 - RCE
The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.
2 stars
CVSS 9.8
CVE-2025-7401 GITHUB CRITICAL python WORKING POC
WordPress Premium Age Verification <3.0.2 - Info Disclosure
The Premium Age Verification / Restriction for WordPress plugin for WordPress is vulnerable to arbitrary file read and write due to the existence of an insufficiently protected remote support functionality in remote_tunnel.php in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to read from or write to arbitrary files on the affected site's server which may make the exposure of sensitive information or remote code execution possible.
2 stars
CVSS 9.8