Vulnerability & Patch Roundup — October 2025

Vulnerability & Patch Roundup — October 2025

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.

To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.

The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.


Plugins


Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9703
Number of Installations: 2,000,000+
Affected Software: Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) <= 2.4.9
Patched Versions: Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) 2.5.0

Mitigation steps: Update to Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) plugin version 2.5.0 or greater.


Enable Media Replace – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9496
Number of Installations: 600,000+
Affected Software: Enable Media Replace <= 4.1.6
Patched Versions: Enable Media Replace 4.1.7

Mitigation steps: Update to Enable Media Replace plugin version 4.1.7 or greater.


BackWPup – WordPress Backup & Restore Plugin – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-10579
Number of Installations: 500,000+
Affected Software: BackWPup – WordPress Backup & Restore Plugin <= 5.5.0
Patched Versions: BackWPup – WordPress Backup & Restore Plugin 5.5.1

Mitigation steps: Update to BackWPup – WordPress Backup & Restore Plugin version 5.5.1 or greater.


PixelYourSite – Your smart PIXEL (TAG) & API Manager – Local File Inclusion

Security Risk: High
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Local File Inclusion
CVE: CVE-2025-10723
Number of Installations: 500,000+
Affected Software: PixelYourSite – Your smart PIXEL (TAG) & API Manager <= 11.1.1
Patched Versions: PixelYourSite – Your smart PIXEL (TAG) & API Manager 11.1.2

Mitigation steps: Update to PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin version 11.1.2 or greater.


WP Reset – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-10645
Number of Installations: 400,000+
Affected Software: WP Reset <= 2.05
Patched Versions: WP Reset 2.06

Mitigation steps: Update to WP Reset plugin version 2.06 or greater.


ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11378
Number of Installations: 300,000+
Affected Software: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF <= 6.3.4
Patched Versions: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF 6.3.5

Mitigation steps: Update to ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF plugin version 6.3.5 or greater.


Blocksy Companion – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12475
Number of Installations: 300,000+
Affected Software: Blocksy Companion <= 2.1.14
Patched Versions: Blocksy Companion 2.1.15

Mitigation steps: Update to Blocksy Companion plugin version 2.1.15 or greater.


SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-10732
Number of Installations: 300,000+
Affected Software: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more <= 1.12.1
Patched Versions: SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more 1.12.2

Mitigation steps: Update to SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more plugin version 1.12.2 or greater.


WP Go Maps (formerly WP Google Maps) – Content Injection

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Content Injection
CVE: CVE-2025-11703
Number of Installations: 300,000+
Affected Software: WP Go Maps (formerly WP Google Maps) <= 9.0.48
Patched Versions: WP Go Maps (formerly WP Google Maps) 9.0.49

Mitigation steps: Update to WP Go Maps (formerly WP Google Maps) plugin version 9.0.49 or greater.


Redirection for Contact Form 7 – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9562
Number of Installations: 300,000+
Affected Software: Redirection for Contact Form 7 <= 3.2.6
Patched Versions: Redirection for Contact Form 7 3.2.7

Mitigation steps: Update to Redirection for Contact Form 7 plugin version 3.2.7 or greater.


Jeg Kit for Elementor – Powerful Elementor Addons, Widgets & Templates for WordPress – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9978
Number of Installations: 300,000+
Affected Software: Jeg Kit for Elementor – Powerful Elementor Addons, Widgets & Templates for WordPress <= 2.6.9
Patched Versions: Jeg Kit for Elementor – Powerful Elementor Addons, Widgets & Templates for WordPress 2.7.0

Mitigation steps: Update to Jeg Kit for Elementor – Powerful Elementor Addons, Widgets & Templates for WordPress plugin version 2.7.0 or greater.


Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content – Bypass Vulnerability

Security Risk: Low
Exploitation Level: No authentication required.
Vulnerability: Bypass Vulnerability
CVE: CVE-2025-11244
Number of Installations: 300,000+
Affected Software: Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content <= 2.7.11
Patched Versions: Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content 2.7.12

Mitigation steps: Update to Password Protected — Lock Entire Site, Pages, Posts, Categories, and Partial Content plugin version 2.7.12 or greater.


GenerateBlocks – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-11879
Number of Installations: 200,000+
Affected Software: GenerateBlocks <= 2.1.1
Patched Versions: GenerateBlocks 2.1.2

Mitigation steps: Update to GenerateBlocks plugin version 2.1.2 or greater.


User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-10694
Number of Installations: 200,000+
Affected Software: User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds <= 1.8.9
Patched Versions: User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds 1.9.0

Mitigation steps: Update to User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin version 1.9.0 or greater.


Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11270
Number of Installations: 200,000+
Affected Software: Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns <= 5.7.1
Patched Versions: Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns 5.7.2

Mitigation steps: Update to Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin version 5.7.2 or greater.


Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns – Server Side Request Forgery (SSRF)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Server Side Request Forgery (SSRF)
CVE: CVE-2025-11361
Number of Installations: 200,000+
Affected Software: Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns <= 5.7.1
Patched Versions: Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns 5.7.2

Mitigation steps: Update to Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin version 5.7.2 or greater.


FileBird – WordPress Media Library Folders & File Manager – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11510
Number of Installations: 200,000+
Affected Software: FileBird – WordPress Media Library Folders & File Manager <= 6.4.9
Patched Versions: FileBird – WordPress Media Library Folders & File Manager 6.5.0

Mitigation steps: Update to FileBird – WordPress Media Library Folders & File Manager plugin version 6.5.0 or greater.


Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-11519
Number of Installations: 200,000+
Affected Software: Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization <= 4.1.0
Patched Versions: Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization 4.1.1

Mitigation steps: Update to Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin version 4.1.1 or greater.


Element Pack Addons for Elementor – Server Side Request Forgery (SSRF)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Server Side Request Forgery (SSRF)
CVE: CVE-2025-11536
Number of Installations: 100,000+
Affected Software: Element Pack Addons for Elementor <= 8.2.5
Patched Versions: Element Pack Addons for Elementor 8.2.6

Mitigation steps: Update to Element Pack Addons for Elementor plugin version 8.2.6 or greater.


WPC Smart Quick View for WooCommerce – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-11741
Number of Installations: 100,000+
Affected Software: WPC Smart Quick View for WooCommerce <= 4.2.5
Patched Versions: WPC Smart Quick View for WooCommerce 4.2.6

Mitigation steps: Update to WPC Smart Quick View for WooCommerce plugin version 4.2.6 or greater.


WPC Smart Wishlist for WooCommerce – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11742
Number of Installations: 100,000+
Affected Software: WPC Smart Wishlist for WooCommerce <= 5.0.4
Patched Versions: WPC Smart Wishlist for WooCommerce 5.0.5

Mitigation steps: Update to WPC Smart Wishlist for WooCommerce plugin version 5.0.5 or greater.


GiveWP – Donation Plugin and Fundraising Platform – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11227
Number of Installations: 100,000+
Affected Software: GiveWP – Donation Plugin and Fundraising Platform <= 4.10.0
Patched Versions: GiveWP – Donation Plugin and Fundraising Platform 4.10.1

Mitigation steps: Update to GiveWP – Donation Plugin and Fundraising Platform plugin version 4.10.1 or greater.


GiveWP – Donation Plugin and Fundraising Platform – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11228
Number of Installations: 100,000+
Affected Software: GiveWP – Donation Plugin and Fundraising Platform <= 4.10.0
Patched Versions: GiveWP – Donation Plugin and Fundraising Platform 4.10.1

Mitigation steps: Update to GiveWP – Donation Plugin and Fundraising Platform plugin version 4.10.1 or greater.


Responsive Lightbox & Gallery – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9710
Number of Installations: 100,000+
Affected Software: Responsive Lightbox & Gallery <= 2.5.2
Patched Versions: Responsive Lightbox & Gallery 2.5.3

Mitigation steps: Update to Responsive Lightbox & Gallery plugin version 2.5.3 or greater.


Schema & Structured Data for WP & AMP – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9512
Number of Installations: 100,000+
Affected Software: Schema & Structured Data for WP & AMP <= 1.49
Patched Versions: Schema & Structured Data for WP & AMP 1.50

Mitigation steps: Update to Schema & Structured Data for WP & AMP plugin version 1.50 or greater.


Colibri Page Builder – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9560
Number of Installations: 100,000+
Affected Software: Colibri Page Builder <= 1.0.334
Patched Versions: Colibri Page Builder 1.0.335

Mitigation steps: Update to Colibri Page Builder plugin version 1.0.335 or greater.


The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-9698
Number of Installations: 100,000+
Affected Software: The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce <= 6.3.15
Patched Versions: The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce 6.3.16

Mitigation steps: Update to The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin version 6.3.16 or greater.


WPC Smart Wishlist for WooCommerce – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-11518
Number of Installations: 100,000+
Affected Software: WPC Smart Wishlist for WooCommerce <= 5.0.3
Patched Versions: WPC Smart Wishlist for WooCommerce 5.0.4

Mitigation steps: Update to WPC Smart Wishlist for WooCommerce plugin version 5.0.4 or greater.


Real Cookie Banner: GDPR & ePrivacy Cookie Consent – Server Side Request Forgery (SSRF)

Security Risk: Medium
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Server Side Request Forgery (SSRF)
CVE: CVE-2025-12136
Number of Installations: 100,000+
Affected Software: Real Cookie Banner: GDPR & ePrivacy Cookie Consent <= 5.2.4
Patched Versions: Real Cookie Banner: GDPR & ePrivacy Cookie Consent 5.2.5

Mitigation steps: Update to Real Cookie Banner: GDPR & ePrivacy Cookie Consent plugin version 5.2.5 or greater.


Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More – Server Side Request Forgery (SSRF)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Server Side Request Forgery (SSRF)
CVE: CVE-2025-10874
Number of Installations: 100,000+
Affected Software: Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More <= 3.0.1
Patched Versions: Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More 3.0.2

Mitigation steps: Update to Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More plugin version 3.0.2 or greater.


Tutor LMS – eLearning and online course solution – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11564
Number of Installations: 100,000+
Affected Software: Tutor LMS – eLearning and online course solution <= 3.8.9
Patched Versions: Tutor LMS – eLearning and online course solution 3.9.0

Mitigation steps: Update to Tutor LMS – eLearning and online course solution plugin version 3.9.0 or greater.


Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-10580
Number of Installations: 100,000+
Affected Software: Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets <= 4.1.2
Patched Versions: Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets 4.1.3

Mitigation steps: Update to Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin version 4.1.3 or greater.


ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11823
Number of Installations: 100,000+
Affected Software: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) <= 3.2.4
Patched Versions: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) 3.2.5

Mitigation steps: Update to ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin version 3.2.5 or greater.


Event Tickets and Registration – Broken Authentication

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Authentication
CVE: CVE-2025-11517
Number of Installations: 90,000+
Affected Software: Event Tickets and Registration <= 5.26.5
Patched Versions: Event Tickets and Registration 5.26.6

Mitigation steps: Update to Event Tickets and Registration plugin version 5.26.6 or greater.


Event Tickets and Registration – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-62027
Number of Installations: 90,000+
Affected Software: Event Tickets and Registration <= 5.26.3
Patched Versions: Event Tickets and Registration 5.26.4

Mitigation steps: Update to Event Tickets and Registration plugin version 5.26.4 or greater.


Social Feed Gallery – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-10637
Number of Installations: 90,000+
Affected Software: Social Feed Gallery <= 4.9.2
Patched Versions: Social Feed Gallery 4.9.3

Mitigation steps: Update to Social Feed Gallery plugin version 4.9.3 or greater.


Ajax Search Lite – Live Search & Filter – PHP Object Injection

Security Risk: Medium
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: PHP Object Injection
CVE: CVE-2025-48086
Number of Installations: 80,000+
Affected Software: Ajax Search Lite – Live Search & Filter <= 4.13.3
Patched Versions: Ajax Search Lite – Live Search & Filter 4.13.4

Mitigation steps: Update to Ajax Search Lite – Live Search & Filter plugin version 4.13.4 or greater.


LearnPress – WordPress LMS Plugin – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11372
Number of Installations: 80,000+
Affected Software: LearnPress – WordPress LMS Plugin <= 4.2.9.3
Patched Versions: LearnPress – WordPress LMS Plugin 4.2.9.4

Mitigation steps: Update to LearnPress – WordPress LMS Plugin version 4.2.9.4 or greater.


Featured Image from URL (FIFU) – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-7400
Number of Installations: 80,000+
Affected Software: Featured Image from URL (FIFU) <= 5.2.7
Patched Versions: Featured Image from URL (FIFU) 5.2.8

Mitigation steps: Update to Featured Image from URL (FIFU) plugin version 5.2.8 or greater.


Meta Tag Manager – Open Redirection

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Open Redirection
CVE: CVE-2025-5983
Number of Installations: 80,000+
Affected Software: Meta Tag Manager <= 3.2
Patched Versions: Meta Tag Manager 3.3

Mitigation steps: Update to Meta Tag Manager plugin version 3.3 or greater.


ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution – Broken Access Control

Security Risk: Low
Exploitation Level: Requires Editor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11888
Number of Installations: 70,000+
Affected Software: ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution <= 4.8.4
Patched Versions: ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution 4.8.5

Mitigation steps: Update to ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin version 4.8.5 or greater.


All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more. – Bypass Vulnerability

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Bypass Vulnerability
CVE: CVE-2025-58595
Number of Installations: 70,000+
Affected Software: All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more. <= 2.0.8
Patched Versions: All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more. 2.0.9

Mitigation steps: Update to All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more. plugin version 2.0.9 or greater.


Media Library Assistant – Arbitrary File Download

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Arbitrary File Download
CVE: CVE-2025-11738
Number of Installations: 70,000+
Affected Software: Media Library Assistant <= 3.29
Patched Versions: Media Library Assistant 3.30

Mitigation steps: Update to Media Library Assistant plugin version 3.30 or greater.


Product Filter by WBW – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2025-8416
Number of Installations: 60,000+
Affected Software: Product Filter by WBW <= 2.9.7
Patched Versions: Product Filter by WBW 2.9.8

Mitigation steps: Update to Product Filter by WBW plugin version 2.9.8 or greater.


Product Filter by WBW – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11269
Number of Installations: 60,000+
Affected Software: Product Filter by WBW <= 3.0.0
Patched Versions: Product Filter by WBW 3.0.1

Mitigation steps: Update to Product Filter by WBW plugin version 3.0.1 or greater.


Quick Featured Images – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-11176
Number of Installations: 50,000+
Affected Software: Quick Featured Images <= 13.7.2
Patched Versions: Quick Featured Images 13.7.3

Mitigation steps: Update to Quick Featured Images plugin version 13.7.3 or greater.


Bold Page Builder – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-7730
Number of Installations: 50,000+
Affected Software: Bold Page Builder <= 5.4.5
Patched Versions: Bold Page Builder 5.4.6

Mitigation steps: Update to Bold Page Builder plugin version 5.4.6 or greater.


RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator – Server Side Request Forgery (SSRF)

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Server Side Request Forgery (SSRF)
CVE: CVE-2025-11128
Number of Installations: 50,000+
Affected Software: RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 5.1.0
Patched Versions: RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator 5.1.1

Mitigation steps: Update to RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin version 5.1.1 or greater.


Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12033
Number of Installations: 50,000+
Affected Software: Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website <= 3.0.9
Patched Versions: Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website 3.1.0

Mitigation steps: Update to Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website plugin version 3.1.0 or greater.


Themes


Newsup – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-8682
Number of Downloads: 2,613,735
Affected Software: Newsup <= 5.0.10
Patched Versions: Newsup 5.0.11

Mitigation steps: Update to Newsup theme version 5.0.11 or greater.


Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.

You May Also Like