Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.
To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-58246 Affected Software: WordPress Core (No fix available) Patched Versions: No fix available
Mitigation steps: Monitor for updates and apply security best practices.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58674 Affected Software: WordPress Core (No fix available) Patched Versions: No fix available
Mitigation steps: Monitor for updates and apply security best practices.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-58649 Number of Installations: 3,000,000+ Affected Software: All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58650 Number of Installations: 3,000,000+ Affected Software: All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2025-9808 Number of Installations: 700,000+ Affected Software: The Events Calendar <= 6.15.2 Patched Versions: The Events Calendar 6.15.3
Mitigation steps: Update to The Events Calendar plugin version 6.15.3 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2025-9807 Number of Installations: 700,000+ Affected Software: The Events Calendar <= 6.15.1 Patched Versions: The Events Calendar 6.15.1.1
Mitigation steps: Update to The Events Calendar plugin version 6.15.1.1 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: PHP Object Injection CVE: CVE-2025-9083 Number of Installations: 600,000+ Affected Software: Ninja Forms – The Contact Form Builder That Grows With You <= 3.11.0 Patched Versions: Ninja Forms – The Contact Form Builder That Grows With You 3.11.1
Mitigation steps: Update to Ninja Forms plugin version 3.11.1 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2025-9260 Number of Installations: 600,000+ Affected Software: Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder <= 6.1.1 Patched Versions: Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder 6.1.2
Mitigation steps: Update to Fluent Forms plugin version 6.1.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-9493 Number of Installations: 400,000+ Affected Software: Admin Menu Editor <= 1.14.0 Patched Versions: Admin Menu Editor 1.14.1
Mitigation steps: Update to Admin Menu Editor plugin version 1.14.1 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-9219 Number of Installations: 400,000+ Affected Software: Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more <= 3.4.1 Patched Versions: Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more 3.4.2
Mitigation steps: Update to Post SMTP plugin version 3.4.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58251 Number of Installations: 300,000+ Affected Software: Sticky Header Effects for Elementor (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-9565 Number of Installations: 300,000+ Affected Software: Blocksy Companion <= 2.1.10 Patched Versions: Blocksy Companion 2.1.11
Mitigation steps: Update to Blocksy Companion plugin version 2.1.11 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-10489 Number of Installations: 300,000+ Affected Software: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more <= 1.12.0 Patched Versions: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more 1.12.1
Mitigation steps: Update to SureForms plugin version 1.12.1 or greater.
Security Risk: Medium Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-9487 Number of Installations: 200,000+ Affected Software: Admin and Site Enhancements (ASE) <= 7.9.7 Patched Versions: Admin and Site Enhancements (ASE) 7.9.8
Mitigation steps: Update to Admin and Site Enhancements (ASE) plugin version 7.9.8 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58031 Number of Installations: 200,000+ Affected Software: Nextend Social Login and Register (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58593 Number of Installations: 200,000+ Affected Software: Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More <= 3.0.0 Patched Versions: Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More 3.0.1
Mitigation steps: Update to Orbit Fox plugin version 3.0.1 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2025-58247 Number of Installations: 100,000+ Affected Software: TI WooCommerce Wishlist (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2025-8268 Number of Installations: 100,000+ Affected Software: AI Engine <= 2.9.5 Patched Versions: AI Engine 2.9.6
Mitigation steps: Update to AI Engine plugin version 2.9.6 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-8722 Number of Installations: 100,000+ Affected Software: Content Views – Post Grid & Filter, Recent Posts, Category Posts … (Shortcode, Blocks, and Elementor Widgets) <= 4.1.9 Patched Versions: Content Views – Post Grid & Filter, Recent Posts, Category Posts … (Shortcode, Blocks, and Elementor Widgets) 4.2
Mitigation steps: Update to Content Views plugin version 4.2 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-8778 Number of Installations: 100,000+ Affected Software: NitroPack – Caching & Speed Optimization for Core Web Vitals, Defer CSS & JS, Lazy load Images and CDN <= 1.18.4 Patched Versions: NitroPack – Caching & Speed Optimization for Core Web Vitals, Defer CSS & JS, Lazy load Images and CDN 1.18.5
Mitigation steps: Update to NitroPack plugin version 1.18.5 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2025-58993 Number of Installations: 100,000+ Affected Software: Tutor LMS – eLearning and online course solution <= 3.7.9 Patched Versions: Tutor LMS – eLearning and online course solution 3.8.0
Mitigation steps: Update to Tutor LMS plugin version 3.8.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58990 Number of Installations: 100,000+ Affected Software: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) <= 3.2.0 Patched Versions: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) 3.2.1
Mitigation steps: Update to ShopLentor plugin version 3.2.1 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2025-10001 Number of Installations: 100,000+ Affected Software: Import any XML, CSV or Excel File to WordPress <= 3.9.3 Patched Versions: Import any XML, CSV or Excel File to WordPress 3.9.4
Mitigation steps: Update to Import any XML, CSV or Excel File to WordPress plugin version 3.9.4 or greater.
Security Risk: Medium Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-59593 Number of Installations: 100,000+ Affected Software: Colibri Page Builder <= 1.0.333 Patched Versions: Colibri Page Builder 1.0.334
Mitigation steps: Update to Colibri Page Builder plugin version 1.0.334 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-10146 Number of Installations: 100,000+ Affected Software: Download Manager <= 3.3.23 Patched Versions: Download Manager 3.3.24
Mitigation steps: Update to Download Manager plugin version 3.3.24 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-8487 Number of Installations: 100,000+ Affected Software: Kubio AI Page Builder <= 2.6.4 Patched Versions: Kubio AI Page Builder 2.6.5
Mitigation steps: Update to Kubio AI Page Builder plugin version 2.6.5 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-59592 Number of Installations: 100,000+ Affected Software: Make Column Clickable for Elementor <= 1.6.0 Patched Versions: Make Column Clickable for Elementor 1.6.1
Mitigation steps: Update to Make Column Clickable for Elementor plugin version 1.6.1 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2025-6189 Number of Installations: 90,000+ Affected Software: Duplicate Page and Post (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling or replacing the Duplicate Page and Post plugin until a fix is released.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-8388 Number of Installations: 90,000+ Affected Software: PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) <= 2.9.4 Patched Versions: PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) 2.9.5
Mitigation steps: Update to PowerPack Addons for Elementor plugin version 2.9.5 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-58226 Number of Installations: 80,000+ Affected Software: 3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipbook Image Gallery (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58264 Number of Installations: 80,000+ Affected Software: Jupiter X Core (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-59591 Number of Installations: 80,000+ Affected Software: Comments – wpDiscuz <= 7.6.33 Patched Versions: Comments – wpDiscuz 7.6.34
Mitigation steps: Update to Comments – wpDiscuz plugin version 7.6.34 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-59590 Number of Installations: 70,000+ Affected Software: Media Library Assistant <= 3.28 Patched Versions: Media Library Assistant 3.29
Mitigation steps: Update to Media Library Assistant plugin version 3.29 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-58025 Number of Installations: 70,000+ Affected Software: Master Slider – Responsive Touch Slider (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58594 Number of Installations: 70,000+ Affected Software: Brizy – Page Builder <= 2.7.12 Patched Versions: Brizy – Page Builder 2.7.13
Mitigation steps: Update to Brizy – Page Builder plugin version 2.7.13 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2025-9085 Number of Installations: 60,000+ Affected Software: User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin <= 4.3.9 Patched Versions: User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin 4.4.0
Mitigation steps: Update to User Registration & Membership plugin version 4.4.0 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Content Injection CVE: CVE-2025-9489 Number of Installations: 60,000+ Affected Software: WP-Members Membership Plugin <= 3.5.4.2 Patched Versions: WP-Members Membership Plugin 3.5.4.3
Mitigation steps: Update to WP-Members Membership Plugin version 3.5.4.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-57973 Number of Installations: 60,000+ Affected Software: WP-Members Membership Plugin <= 3.5.4.2 Patched Versions: WP-Members Membership Plugin 3.5.4.3
Mitigation steps: Update to WP-Members Membership Plugin version 3.5.4.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-58252 Number of Installations: 50,000+ Affected Software: Getwid – Gutenberg Blocks (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-57939 Number of Installations: 50,000+ Affected Software: Image Hover Effects – Elementor Addon (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2025-58686 Number of Installations: 50,000+ Affected Software: Perfect Brands for WooCommerce (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-53466 Number of Installations: 50,000+ Affected Software: Better Find and Replace – AI-Powered Suggestions (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the plugin until a fix is released or seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Settings Change CVE: CVE-2025-8944 Number of Downloads: 8,786,658 Affected Software: OceanWP <= 4.1.1 Patched Versions: OceanWP 4.1.2
Mitigation steps: Update to OceanWP theme version 4.1.2 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-8999 Number of Downloads: 4,661,099 Affected Software: Sydney <= 2.56 Patched Versions: Sydney 2.57
Mitigation steps: Update to Sydney theme version 2.57 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 1,314,146 Affected Software: ColorWay (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58813 Number of Downloads: 581,213 Affected Software: ConsultStreet (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 194,918 Affected Software: Themia Lite (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58817 Number of Downloads: 155,328 Affected Software: SoftMe (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 114,483 Affected Software: Dzonia Lite (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 111,776 Affected Software: Cloriato Lite (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58824 Number of Downloads: 105,547 Affected Software: Shk Corporate (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 82,748 Affected Software: Road Fighter (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 71,063 Affected Software: Poloray (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 70,694 Affected Software: ButterBelly (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2025-58606 Number of Downloads: 67,440 Affected Software: SaasLauncher <= 1.3.0 Patched Versions: SaasLauncher 1.3.1
Mitigation steps: Update to SaasLauncher theme version 1.3.1 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2025-59003 Number of Downloads: 65,712 Affected Software: Compass (No fix available) Patched Versions: No fix available
Mitigation steps: Consider disabling the theme until a fix is released and seek alternative solutions.
Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.