Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.
To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.
The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-14732 Number of Installations: 10,000,000+ Affected Software: Elementor Website Builder <= 3.35.5 Patched Versions: Elementor Website Builder 3.35.6
Mitigation steps: Update to Elementor Website Builder version 3.35.6 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-4812 Number of Installations: 2,000,000+ Affected Software: Advanced Custom Fields (ACF®) <= 6.7.0 Patched Versions: Advanced Custom Fields (ACF®) 6.7.1
Mitigation steps: Update to Advanced Custom Fields (ACF®) version 6.7.1 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2600 Number of Installations: 2,000,000+ Affected Software: ElementsKit Elementor Addons <= 3.7.9 Patched Versions: ElementsKit Elementor Addons 3.8.0
Mitigation steps: Update to ElementsKit Elementor Addons version 3.8.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-39463 Number of Installations: 1,000,000+ Affected Software: ManageWP Worker <= 4.9.31 Patched Versions: ManageWP Worker 4.9.32
Mitigation steps: Update to ManageWP Worker version 4.9.32 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-2712 Number of Installations: 1,000,000+ Affected Software: WP-Optimize <= 4.5.0 Patched Versions: WP-Optimize 4.5.1
Mitigation steps: Update to WP-Optimize version 4.5.1 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-5032 Number of Installations: 900,000+ Affected Software: W3 Total Cache <= 2.9.3 Patched Versions: W3 Total Cache 2.9.4
Mitigation steps: Update to W3 Total Cache version 2.9.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4065 Number of Installations: 800,000+ Affected Software: Smart Slider 3 <= 3.5.1.33 Patched Versions: Smart Slider 3 3.5.1.34
Mitigation steps: Update to Smart Slider 3 version 3.5.1.34 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Authentication CVE: CVE-2026-4160 Number of Installations: 700,000+ Affected Software: Fluent Forms <= 6.1.9 Patched Versions: Fluent Forms 6.2.0
Mitigation steps: Update to Fluent Forms version 6.2.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5162 Number of Installations: 600,000+ Affected Software: Royal Addons for Elementor <= 1.7.1056 Patched Versions: Royal Addons for Elementor 1.7.1057
Mitigation steps: Update to Royal Addons for Elementor version 1.7.1057 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-2826 Number of Installations: 600,000+ Affected Software: Kadence Blocks <= 3.6.3 Patched Versions: Kadence Blocks 3.6.4
Mitigation steps: Update to Kadence Blocks version 3.6.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-0664 Number of Installations: 600,000+ Affected Software: Royal Addons for Elementor <= 1.7.1049 Patched Versions: Royal Addons for Elementor 1.7.1050
Mitigation steps: Update to Royal Addons for Elementor version 1.7.1050 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5231 Number of Installations: 600,000+ Affected Software: WP Statistics <= 14.16.4 Patched Versions: WP Statistics 14.16.5
Mitigation steps: Update to WP Statistics version 14.16.5 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Local File Inclusion CVE: CVE-2026-6227 Number of Installations: 500,000+ Affected Software: BackWPup <= 5.6.6 Patched Versions: BackWPup 5.6.7
Mitigation steps: Update to BackWPup version 5.6.7 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Arbitrary File Deletion CVE: CVE-2026-39468 Number of Installations: 500,000+ Affected Software: Meta Box <= 5.11.1 Patched Versions: Meta Box 5.11.2
Mitigation steps: Update to Meta Box version 5.11.2 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-34903 Number of Installations: 500,000+ Affected Software: Ocean Extra <= 2.5.3 Patched Versions: Ocean Extra 2.5.4
Mitigation steps: Update to Ocean Extra version 2.5.4 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-4432 Number of Installations: 500,000+ Affected Software: YITH WooCommerce Wishlist <= 4.12.9 Patched Versions: YITH WooCommerce Wishlist 4.13.0
Mitigation steps: Update to YITH WooCommerce Wishlist version 4.13.0 or greater.
Security Risk: High Exploitation Level: Requires Editor or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39467 Number of Installations: 500,000+ Affected Software: MetaSlider <= 3.106.9 Patched Versions: MetaSlider 3.107.0
Mitigation steps: Update to MetaSlider version 3.107.0 or greater.
Security Risk: Critical Exploitation Level: Requires Editor or higher level authentication. Vulnerability: Remote Code Execution (RCE) CVE: CVE-2026-39465 Number of Installations: 500,000+ Affected Software: MetaSlider <= 3.106.9 Patched Versions: MetaSlider 3.107.0
Mitigation steps: Update to MetaSlider version 3.107.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3885 Number of Installations: 400,000+ Affected Software: Shortcodes Ultimate <= 7.4.9 Patched Versions: Shortcodes Ultimate 7.5.0
Mitigation steps: Update to Shortcodes Ultimate version 7.5.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-0738 Number of Installations: 400,000+ Affected Software: Shortcodes Ultimate <= 7.4.8 Patched Versions: Shortcodes Ultimate 7.4.9
Mitigation steps: Update to Shortcodes Ultimate version 7.4.9 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-0737 Number of Installations: 400,000+ Affected Software: Shortcodes Ultimate <= 7.4.7 Patched Versions: Shortcodes Ultimate 7.4.8
Mitigation steps: Update to Shortcodes Ultimate version 7.4.8 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2509 Number of Installations: 400,000+ Affected Software: Pagelayer <= 2.0.8 Patched Versions: Pagelayer 2.0.9
Mitigation steps: Update to Pagelayer version 2.0.9 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4801 Number of Installations: 300,000+ Affected Software: CoBlocks <= 3.1.16 Patched Versions: CoBlocks 3.1.17
Mitigation steps: Update to CoBlocks version 3.1.17 or greater.
Security Risk: High Exploitation Level: Requires Author or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39471 Number of Installations: 300,000+ Affected Software: ShortPixel Image Optimizer <= 6.4.3 Patched Versions: ShortPixel Image Optimizer 6.4.4
Mitigation steps: Update to ShortPixel Image Optimizer version 6.4.4 or greater.
Security Risk: High Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: Privilege Escalation CVE: CVE-2026-39470 Number of Installations: 300,000+ Affected Software: Cart Abandonment Recovery for WooCommerce <= 2.0.9 Patched Versions: Cart Abandonment Recovery for WooCommerce 2.1.0
Mitigation steps: Update to Cart Abandonment Recovery for WooCommerce version 2.1.0 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Arbitrary File Download CVE: CVE-2026-4659 Number of Installations: 300,000+ Affected Software: Unlimited Elements For Elementor <= 2.0.6 Patched Versions: Unlimited Elements For Elementor 2.0.7
Mitigation steps: Update to Unlimited Elements For Elementor version 2.0.7 or greater.
Security Risk: High Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39472 Number of Installations: 300,000+ Affected Software: PDF Invoices & Packing Slips for WooCommerce <= 5.8.9 Patched Versions: PDF Invoices & Packing Slips for WooCommerce 5.9.0
Mitigation steps: Update to PDF Invoices & Packing Slips for WooCommerce version 5.9.0 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-6518 Number of Installations: 200,000+ Affected Software: CMP – Coming Soon & Maintenance Plugin <= 4.1.16 Patched Versions: CMP – Coming Soon & Maintenance Plugin 4.1.17
Mitigation steps: Update to CMP – Coming Soon & Maintenance Plugin version 4.1.17 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Directory Traversal CVE: CVE-2026-5436 Number of Installations: 200,000+ Affected Software: MW WP Form <= 5.1.1 Patched Versions: MW WP Form 5.1.2
Mitigation steps: Update to MW WP Form version 5.1.2 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5217 Number of Installations: 200,000+ Affected Software: Optimole <= 4.2.2 Patched Versions: Optimole 4.2.3
Mitigation steps: Update to Optimole version 4.2.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5226 Number of Installations: 200,000+ Affected Software: Optimole <= 4.2.3 Patched Versions: Optimole 4.2.4
Mitigation steps: Update to Optimole version 4.2.4 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39474 Number of Installations: 200,000+ Affected Software: Post Duplicator <= 3.0.10 Patched Versions: Post Duplicator 3.0.11
Mitigation steps: Update to Post Duplicator version 3.0.11 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Directory Traversal CVE: CVE-2026-4347 Number of Installations: 200,000+ Affected Software: MW WP Form <= 5.1.0 Patched Versions: MW WP Form 5.1.1
Mitigation steps: Update to MW WP Form version 5.1.1 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-15064 Number of Installations: 200,000+ Affected Software: Ultimate Member <= 2.11.1 Patched Versions: Ultimate Member 2.11.2
Mitigation steps: Update to Ultimate Member version 2.11.2 or greater.
Security Risk: Medium Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Path Traversal CVE: CVE-2026-4853 Number of Installations: 100,000+ Affected Software: JetBackup <= 3.1.20.2 Patched Versions: JetBackup 3.1.20.3
Mitigation steps: Update to JetBackup version 3.1.20.3 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Directory Traversal CVE: CVE-2026-5478 Number of Installations: 100,000+ Affected Software: Everest Forms <= 3.4.4 Patched Versions: Everest Forms 3.4.5
Mitigation steps: Update to Everest Forms version 3.4.5 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39478 Number of Installations: 100,000+ Affected Software: Anti-Malware Security and Brute-Force Firewall <= 4.23.87 Patched Versions: Anti-Malware Security and Brute-Force Firewall 4.23.88
Mitigation steps: Update to Anti-Malware Security and Brute-Force Firewall version 4.23.88 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-5427 Number of Installations: 100,000+ Affected Software: Kubio <= 2.7.2 Patched Versions: Kubio 2.7.3
Mitigation steps: Update to Kubio version 2.7.3 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-5234 Number of Installations: 100,000+ Affected Software: LatePoint <= 5.3.9 Patched Versions: LatePoint 5.4.0
Mitigation steps: Update to LatePoint version 5.4.0 or greater.
Security Risk: High Exploitation Level: Requires Author or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39481 Number of Installations: 100,000+ Affected Software: Modula Image Gallery <= 2.14.18 Patched Versions: Modula Image Gallery 2.14.19
Mitigation steps: Update to Modula Image Gallery version 2.14.19 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-40743 Number of Installations: 100,000+ Affected Software: Tutor LMS <= 3.9.7 Patched Versions: Tutor LMS 3.9.8
Mitigation steps: Update to Tutor LMS version 3.9.8 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-6080 Number of Installations: 100,000+ Affected Software: Tutor LMS <= 3.9.8 Patched Versions: Tutor LMS 3.9.9
Mitigation steps: Update to Tutor LMS version 3.9.9 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-5502 Number of Installations: 100,000+ Affected Software: Tutor LMS <= 3.9.8 Patched Versions: Tutor LMS 3.9.9
Mitigation steps: Update to Tutor LMS version 3.9.9 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4655 Number of Installations: 100,000+ Affected Software: Element Pack <= 8.4.9 Patched Versions: Element Pack 8.5.0
Mitigation steps: Update to Element Pack version 8.5.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4341 Number of Installations: 100,000+ Affected Software: Prime Slider <= 4.1.10 Patched Versions: Prime Slider 4.1.11
Mitigation steps: Update to Prime Slider version 4.1.11 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2481 Number of Installations: 100,000+ Affected Software: Beaver Builder <= 2.10.1.1 Patched Versions: Beaver Builder 2.10.1.2
Mitigation steps: Update to Beaver Builder version 2.10.1.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4057 Number of Installations: 100,000+ Affected Software: Download Manager <= 3.3.51 Patched Versions: Download Manager 3.3.52
Mitigation steps: Update to Download Manager version 3.3.52 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5357 Number of Installations: 100,000+ Affected Software: Download Manager <= 3.3.52 Patched Versions: Download Manager 3.3.53
Mitigation steps: Update to Download Manager version 3.3.53 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: PHP Object Injection CVE: CVE-2026-3296 Number of Installations: 100,000+ Affected Software: Everest Forms <= 3.4.3 Patched Versions: Everest Forms 3.4.4
Mitigation steps: Update to Everest Forms version 3.4.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4785 Number of Installations: 100,000+ Affected Software: LatePoint <= 5.3.0 Patched Versions: LatePoint 5.3.1
Mitigation steps: Update to LatePoint version 5.3.1 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4299 Number of Installations: 100,000+ Affected Software: MainWP Child Reports <= 2.2 Patched Versions: MainWP Child Reports 2.3
Mitigation steps: Update to MainWP Child Reports version 2.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3311 Number of Installations: 100,000+ Affected Software: The Plus Addons for Elementor <= 6.4.9 Patched Versions: The Plus Addons for Elementor 6.4.10
Mitigation steps: Update to The Plus Addons for Elementor version 6.4.10 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-3371 Number of Installations: 100,000+ Affected Software: Tutor LMS <= 3.9.7 Patched Versions: Tutor LMS 3.9.8
Mitigation steps: Update to Tutor LMS version 3.9.8 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3358 Number of Installations: 100,000+ Affected Software: Tutor LMS <= 3.9.7 Patched Versions: Tutor LMS 3.9.8
Mitigation steps: Update to Tutor LMS version 3.9.8 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-3360 Number of Installations: 100,000+ Affected Software: Tutor LMS – eLearning and online course solution <= 3.9.7 Patched Versions: Tutor LMS – eLearning and online course solution 3.9.8
Mitigation steps: Update to Tutor LMS – eLearning and online course solution version 3.9.8 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Content Injection CVE: CVE-2026-3309 Number of Installations: 100,000+ Affected Software: ProfilePress <= 4.16.11 Patched Versions: ProfilePress 4.16.12
Mitigation steps: Update to ProfilePress version 4.16.12 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-4949 Number of Installations: 100,000+ Affected Software: ProfilePress <= 4.16.12 Patched Versions: ProfilePress 4.16.13
Mitigation steps: Update to ProfilePress version 4.16.13 or greater.
Security Risk: High Exploitation Level: Requires Employee or higher level authentication. Vulnerability: Insecure Direct Object References (IDOR) CVE: CVE-2026-5465 Number of Installations: 90,000+ Affected Software: Amelia <= 2.1 Patched Versions: Amelia 2.2
Mitigation steps: Update to Amelia version 2.2 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-39480 Number of Installations: 90,000+ Affected Software: BackupBliss <= 2.1.1 Patched Versions: BackupBliss 2.1.2
Mitigation steps: Update to BackupBliss version 2.1.2 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2025-14944 Number of Installations: 90,000+ Affected Software: BackupBliss <= 2.0.9 Patched Versions: BackupBliss 2.1.0
Mitigation steps: Update to BackupBliss version 2.1.0 or greater.
Security Risk: Medium Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2024-7083 Number of Installations: 90,000+ Affected Software: Email Encoder <= 2.3.3 Patched Versions: Email Encoder 2.3.4
Mitigation steps: Update to Email Encoder version 2.3.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2840 Number of Installations: 90,000+ Affected Software: Email Encoder <= 2.4.4 Patched Versions: Email Encoder 2.4.5
Mitigation steps: Update to Email Encoder version 2.4.5 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Arbitrary File Download CVE: CVE-2026-39489 Number of Installations: 90,000+ Affected Software: Download Monitor <= 5.1.9 Patched Versions: Download Monitor 5.1.10
Mitigation steps: Update to Download Monitor version 5.1.10 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3239 Number of Installations: 90,000+ Affected Software: Strong Testimonials <= 3.2.21 Patched Versions: Strong Testimonials 3.2.22
Mitigation steps: Update to Strong Testimonials version 3.2.22 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4059 Number of Installations: 90,000+ Affected Software: ShopLentor <= 3.3.5 Patched Versions: ShopLentor 3.3.6
Mitigation steps: Update to ShopLentor version 3.3.6 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-2263 Number of Installations: 90,000+ Affected Software: Hustle <= 7.8.10 Patched Versions: Hustle 7.8.11
Mitigation steps: Update to Hustle version 7.8.11 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Authentication CVE: CVE-2026-4664 Number of Installations: 80,000+ Affected Software: Customer Reviews for WooCommerce <= 5.103.9 Patched Versions: Customer Reviews for WooCommerce 5.104.0
Mitigation steps: Update to Customer Reviews for WooCommerce version 5.104.0 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-39491 Number of Installations: 80,000+ Affected Software: Jupiter X Core <= 4.14.1 Patched Versions: Jupiter X Core 4.14.2
Mitigation steps: Update to Jupiter X Core version 4.14.2 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4333 Number of Installations: 80,000+ Affected Software: LearnPress <= 4.3.3 Patched Versions: LearnPress 4.3.4
Mitigation steps: Update to LearnPress version 4.3.4 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3005 Number of Installations: 80,000+ Affected Software: List category posts <= 0.94.9 Patched Versions: List category posts 0.95.0
Mitigation steps: Update to List category posts version 0.95.0 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3355 Number of Installations: 80,000+ Affected Software: Customer Reviews for WooCommerce <= 5.101.9 Patched Versions: Customer Reviews for WooCommerce 5.102.0
Mitigation steps: Update to Customer Reviews for WooCommerce version 5.102.0 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-1314 Number of Installations: 80,000+ Affected Software: 3D FlipBook <= 1.16.17 Patched Versions: 3D FlipBook 1.16.18
Mitigation steps: Update to 3D FlipBook version 1.16.18 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-39490 Number of Installations: 80,000+ Affected Software: Jupiter X Core <= 4.14.1 Patched Versions: Jupiter X Core 4.14.2
Mitigation steps: Update to Jupiter X Core version 4.14.2 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: Broken Access Control CVE: CVE-2026-4365 Number of Installations: 80,000+ Affected Software: LearnPress <= 4.3.2 Patched Versions: LearnPress 4.3.3
Mitigation steps: Update to LearnPress version 4.3.3 or greater.
Security Risk: Low Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3155 Number of Installations: 70,000+ Affected Software: OneSignal <= 3.8.0 Patched Versions: OneSignal 3.8.1
Mitigation steps: Update to OneSignal version 3.8.1 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Content Injection CVE: CVE-2026-2582 Number of Installations: 70,000+ Affected Software: Germanized for WooCommerce <= 3.20.5 Patched Versions: Germanized for WooCommerce 3.20.6
Mitigation steps: Update to Germanized for WooCommerce version 3.20.6 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5721 Number of Installations: 70,000+ Affected Software: wpDataTables <= 6.5.0.4 Patched Versions: wpDataTables 6.5.0.5
Mitigation steps: Update to wpDataTables version 6.5.0.5 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-0814 Number of Installations: 70,000+ Affected Software: Advanced Contact form 7 DB <= 2.0.9 Patched Versions: Advanced Contact form 7 DB 2.1.0
Mitigation steps: Update to Advanced Contact form 7 DB version 2.1.0 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Content Injection CVE: CVE-2026-2519 Number of Installations: 70,000+ Affected Software: Bookly <= 27.0 Patched Versions: Bookly 27.1
Mitigation steps: Update to Bookly version 27.1 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-4895 Number of Installations: 70,000+ Affected Software: Greenshift <= 12.8.9 Patched Versions: Greenshift 12.9.0
Mitigation steps: Update to Greenshift 12.9.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Broken Access Control CVE: CVE-2026-3831 Number of Installations: 70,000+ Affected Software: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.9 Patched Versions: Database for Contact Form 7, WPforms, Elementor forms 1.5.0
Mitigation steps: Update to Database for Contact Form 7, WPforms, Elementor forms version 1.5.0 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-34897 Number of Installations: 70,000+ Affected Software: Media Library Assistant <= 3.34 Patched Versions: Media Library Assistant 3.35
Mitigation steps: Update to Media Library Assistant version 3.35 or greater.
Security Risk: High Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-34885 Number of Installations: 70,000+ Affected Software: Media Library Assistant <= 3.34 Patched Versions: Media Library Assistant 3.35
Mitigation steps: Update to Media Library Assistant version 3.35 or greater.
Security Risk: High Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39434 Number of Installations: 70,000+ Affected Software: CTX Feed <= 6.6.26 Patched Versions: CTX Feed 6.6.27
Mitigation steps: Update to CTX Feed version 6.6.27 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Arbitrary File Upload CVE: CVE-2026-5718 Number of Installations: 60,000+ Affected Software: Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.6 Patched Versions: Drag and Drop Multiple File Upload for Contact Form 7 1.3.9.7
Mitigation steps: Update to Drag and Drop Multiple File Upload for Contact Form 7 version 1.3.9.7 or greater.
Security Risk: High Exploitation Level: No authentication required. Vulnerability: Arbitrary File Download CVE: CVE-2026-5710 Number of Installations: 60,000+ Affected Software: Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.6 Patched Versions: Drag and Drop Multiple File Upload for Contact Form 7 1.3.9.7
Mitigation steps: Update to Drag and Drop Multiple File Upload for Contact Form 7 version 1.3.9.7 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-3830 Number of Installations: 60,000+ Affected Software: Product Filter for WooCommerce <= 3.1.2 Patched Versions: Product Filter for WooCommerce 3.1.3
Mitigation steps: Update to Product Filter for WooCommerce version 3.1.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2986 Number of Installations: 60,000+ Affected Software: Contextual Related Posts <= 4.2.1 Patched Versions: Contextual Related Posts 4.2.2
Mitigation steps: Update to Contextual Related Posts version 4.2.2 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-39493 Number of Installations: 60,000+ Affected Software: Appointment Booking Calendar <= 1.6.9.28 Patched Versions: Appointment Booking Calendar 1.6.9.29
Mitigation steps: Update to Appointment Booking Calendar version 1.6.9.29 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Open Redirection CVE: CVE-2026-6203 Number of Installations: 60,000+ Affected Software: User Registration & Membership <= 5.1.4 Patched Versions: User Registration & Membership 5.1.5
Mitigation steps: Update to User Registration & Membership version 5.1.5 or greater.
Security Risk: High Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: SQL Injection CVE: CVE-2026-1865 Number of Installations: 60,000+ Affected Software: User Registration & Membership <= 5.1.2 Patched Versions: User Registration & Membership 5.1.3
Mitigation steps: Update to User Registration & Membership version 5.1.3 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-39494 Number of Installations: 60,000+ Affected Software: Product Filter for WooCommerce <= 3.1.2 Patched Versions: Product Filter for WooCommerce 3.1.3
Mitigation steps: Update to Product Filter for WooCommerce version 3.1.3 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-13364 Number of Installations: 60,000+ Affected Software: WP Maps <= 4.8.7 Patched Versions: WP Maps 4.8.8
Mitigation steps: Update to WP Maps version 4.8.8 or greater.
Security Risk: Critical Exploitation Level: No authentication required. Vulnerability: SQL Injection CVE: CVE-2026-39492 Number of Installations: 60,000+ Affected Software: WP Maps <= 4.9.1 Patched Versions: WP Maps 4.9.2
Mitigation steps: Update to WP Maps version 4.9.2 or greater.
Security Risk: High Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39499 Number of Installations: 50,000+ Affected Software: Advanced Product Fields (Product Addons) for WooCommerce <= 1.6.19 Patched Versions: Advanced Product Fields (Product Addons) for WooCommerce 1.6.20
Mitigation steps: Update to Advanced Product Fields (Product Addons) for WooCommerce version 1.6.20 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-2505 Number of Installations: 50,000+ Affected Software: Categories Images <= 3.3.1 Patched Versions: Categories Images 3.3.2
Mitigation steps: Update to Categories Images version 3.3.2 or greater.
Security Risk: Medium Exploitation Level: Requires Author or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-3369 Number of Installations: 50,000+ Affected Software: Better Find and Replace <= 1.7.9 Patched Versions: Better Find and Replace 1.8.0
Mitigation steps: Update to Better Find and Replace version 1.8.0 or greater.
Security Risk: Medium Exploitation Level: No authentication required. Vulnerability: Sensitive Data Exposure CVE: CVE-2026-2696 Number of Installations: 50,000+ Affected Software: Export All URLs <= 5.0 Patched Versions: Export All URLs 5.1
Mitigation steps: Update to Export All URLs version 5.1 or greater.
Security Risk: High Exploitation Level: Requires Administrator or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2025-15611 Number of Installations: 50,000+ Affected Software: Popup Box <= 5.4.9 Patched Versions: Popup Box 5.5.0
Mitigation steps: Update to Popup Box version 5.5.0 or greater.
Security Risk: Medium Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Broken Authentication CVE: CVE-2026-4330 Number of Installations: 50,000+ Affected Software: Blog2Social <= 8.8.3 Patched Versions: Blog2Social 8.8.4
Mitigation steps: Update to Blog2Social version 8.8.4 or greater.
Security Risk: High Exploitation Level: Requires Shop Manager or higher level authentication. Vulnerability: PHP Object Injection CVE: CVE-2026-39498 Number of Installations: 50,000+ Affected Software: YayMail <= 4.3.3 Patched Versions: YayMail 4.3.4
Mitigation steps: Update to YayMail version 4.3.4 or greater.
Security Risk: Medium Exploitation Level: Requires Contributor or higher level authentication. Vulnerability: Cross Site Scripting (XSS) CVE: CVE-2026-5070 Number of Downloads: 3,232,270 Affected Software: Vantage <= 1.20.32 Patched Versions: Vantage 1.20.33
Mitigation steps: Update to Vantage theme version 1.20.33 or greater.
Security Risk: Critical Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-40749 Number of Downloads: 112,126 Affected Software: Charity Zone <= 1.1.1 Patched Versions: Charity Zone 1.1.2
Mitigation steps: Update to Charity Zone theme version 1.1.2 or greater.
Security Risk: Critical Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-40747 Number of Downloads: 89,443 Affected Software: Ecommerce Zone <= 0.9.7 Patched Versions: Ecommerce Zone 0.9.8
Mitigation steps: Update to Ecommerce Zone theme version 0.9.8 or greater.
Security Risk: Critical Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-40750 Number of Downloads: 53,065 Affected Software: Kids Online Store <= 0.8.9 Patched Versions: Kids Online Store 0.9.0
Mitigation steps: Update to Kids Online Store theme version 0.9.0 or greater.
Security Risk: Critical Exploitation Level: Requires Subscriber or higher level authentication. Vulnerability: Arbitrary File Upload CVE: CVE-2026-40746 Number of Downloads: 80,108 Affected Software: Restaurant Zone <= 0.7.8 Patched Versions: Restaurant Zone 0.7.9
Mitigation steps: Update to Restaurant Zone theme version 0.7.9 or greater.
Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.