Latest Vulnerabilities with Public Exploits
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
53,713 results
Clear all
CVE-2024-52375
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.61
Arttia Creative Datasets Manager <1.5 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Arttia Creative Datasets Manager by Arttia Creative datasets-manager-by-arttia-creative.This issue affects Datasets Manager by Arttia Creative: from n/a through <= 1.5.
CWE-434
Nov 14, 2024
CVE-2024-10629
8.8
HIGH
3 PoCs
Analysis
EPSS 0.58
GPX Viewer <2.2.8 - Code Injection
The GPX Viewer plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check and file type validation in the gpxv_file_upload() function in all versions up to, and including, 2.2.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files on the affected site's server which may make remote code execution possible.
CWE-862
Nov 13, 2024
CVE-2024-51788
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.62
The Novel Design Store Directory <4.3.0 - Unrestricted Upload of Fi...
Unrestricted Upload of File with Dangerous Type vulnerability in Joshua Wolfe The Novel Design Store Directory noveldesign-store-directory allows Upload a Web Shell to a Web Server.This issue affects The Novel Design Store Directory: from n/a through <= 4.3.0.
CWE-434
Nov 11, 2024
CVE-2024-10674
8.8
HIGH
2 PoCs
Analysis
EPSS 0.41
Th Shop Mania <1.4.9 - Privilege Escalation
The Th Shop Mania theme for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the th_shop_mania_install_and_activate_callback() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins which can be leveraged to exploit other vulnerabilities and achieve remote code execution and privilege escalation.
CWE-862
Nov 09, 2024
CVE-2024-10673
8.8
HIGH
2 PoCs
Analysis
EPSS 0.52
Top Store theme <1.5.4 - Privilege Escalation
The Top Store theme for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the top_store_install_and_activate_callback() function in all versions up to, and including, 1.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins which can contain other exploitable vulnerabilities to elevate privileges and gain remote code execution.
CWE-862
Nov 09, 2024
CVE-2024-10586
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.59
WordPress Debug Tool <2.3 - RCE
The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. CVE-2024-52416 may be a duplicate of this issue.
CWE-862
Nov 09, 2024
CVE-2024-43998
6.5
MEDIUM
3 PoCs
Analysis
EPSS 0.26
Websiteinwp Blogpoet < 1.0.4 - Missing Authorization
Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3.
CWE-862
Nov 01, 2024
CVE-2024-7985
7.5
HIGH
2 PoCs
Analysis
EPSS 0.50
FileOrganizer <1.0.9 - RCE
The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.
CWE-434
Oct 29, 2024
CVE-2024-50492
8.3
HIGH
SSVC PoC
2 PoCs
Analysis
EPSS 0.57
Scottpaterson Scottcart < 1.1 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Scott Paterson ScottCart scottcart allows Code Injection.This issue affects ScottCart: from n/a through <= 1.1.
CWE-94
Oct 28, 2024
CVE-2024-9933
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.37
WatchTowerHQ <3.9.6 - Auth Bypass
The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
CWE-288
Oct 26, 2024
CVE-2024-49668
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.59
Verbalize WP - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in christopherdewese1099 Verbalize WP verbalize-wp allows Upload a Web Shell to a Web Server.This issue affects Verbalize WP: from n/a through <= 1.0.
CWE-434
Oct 23, 2024
CVE-2024-49653
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.59
James Eggers Portfolleo <1.2 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in james-eggers Portfolleo portfolleo allows Upload a Web Shell to a Web Server.This issue affects Portfolleo: from n/a through <= 1.2.
CWE-434
Oct 23, 2024
CVE-2024-49328
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.42
Vivektamrakar WP Rest API Fns < 1.0.0 - Missing Authentication
Authentication Bypass Using an Alternate Path or Channel vulnerability in vivek2tamrakar WP REST API FNS rest-api-fns allows Authentication Bypass.This issue affects WP REST API FNS: from n/a through <= 1.0.0.
CWE-288
Oct 20, 2024
CVE-2024-9593
8.3
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.86
Wpplugin Time Clock < 1.1.4 - Code Injection
The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified.
CWE-94
Oct 18, 2024
CVE-2024-9756
4.3
MEDIUM
2 PoCs
Analysis
EPSS 0.04
Directsoftware Order Attachments For ... - Missing Authorization
The Order Attachments for WooCommerce plugin for WordPress is vulnerable to unauthorized limited arbitrary file uploads due to a missing capability check on the wcoa_add_attachment AJAX action in versions 2.0 to 2.4.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload limited file types.
CWE-862
Oct 12, 2024
CVE-2024-9234
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.93
GutenKit - Unauthenticated RCE
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
CWE-862
Oct 11, 2024
CVE-2024-6460
9.8
CRITICAL
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Grow by Tradedoubler <2.0.21 - Code Injection
The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Aug 16, 2024
CVE-2024-7135
6.5
MEDIUM
3 PoCs
Analysis
EPSS 0.48
Tainacan < 0.21.8 - Missing Authorization
The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CWE-862
Jul 31, 2024
CVE-2024-6366
9.1
CRITICAL
SSVC PoC
3 PoCs
Analysis
NUCLEI
EPSS 0.91
User Profile Builder <3.11.8 - Info Disclosure
The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP.
CWE-434
Jul 29, 2024
CVE-2024-6244
8.8
HIGH
SSVC PoC
3 PoCs
Analysis
EPSS 0.13
PZ Frontend Manager <1.0.6 - CSRF
The PZ Frontend Manager WordPress plugin before 1.0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
CWE-352
Jul 22, 2024