Vulnerability & Patch Roundup — November 2025

Vulnerability & Patch Roundup — November 2025

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises.

To help educate website owners about potential threats to their environments, we’ve compiled a list of important security updates and vulnerability patches for the WordPress ecosystem this past month.

The vulnerabilities listed below are virtually patched by the Sucuri Firewall and existing clients are protected. If you don’t have it installed yet, you can use our web application firewall to protect your site against known vulnerabilities.


Plugins


All in One SEO – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12847
Number of Installations: 3,000,000+
Affected Software: All in One SEO <= 4.8.9
Patched Versions: All in One SEO 4.9.0

Mitigation steps: Update to All in One SEO plugin version 4.9.0 or greater.


Code Snippets – Remote Code Execution (RCE)

Security Risk: High
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2025-13035
Number of Installations: 1,000,000+
Affected Software: Code Snippets <= 3.9.1
Patched Versions: Code Snippets 3.9.2

Mitigation steps: Update to Code Snippets plugin version 3.9.2 or greater.


W3 Total Cache – Remote Code Execution (RCE)

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2025-9501
Number of Installations: 1,000,000+
Affected Software: W3 Total Cache <= 2.8.12
Patched Versions: W3 Total Cache 2.8.13

Mitigation steps: Update to W3 Total Cache plugin version 2.8.13 or greater.


Spectra Gutenberg Blocks – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11162
Number of Installations: 1,000,000+
Affected Software: Spectra Gutenberg Blocks <= 2.19.14
Patched Versions: Spectra Gutenberg Blocks 2.19.15

Mitigation steps: Update to Spectra Gutenberg Blocks plugin version 2.19.15 or greater.


The Events Calendar – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2025-12197
Number of Installations: 700,000+
Affected Software: The Events Calendar <= 6.15.9
Patched Versions: The Events Calendar 6.15.10

Mitigation steps: Update to The Events Calendar plugin version 6.15.10 or greater.


The Events Calendar – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-12192
Number of Installations: 700,000+
Affected Software: The Events Calendar <= 6.15.9
Patched Versions: The Events Calendar 6.15.10

Mitigation steps: Update to The Events Calendar plugin version 6.15.10 or greater.


TablePress – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12324
Number of Installations: 700,000+
Affected Software: TablePress <= 3.2.4
Patched Versions: TablePress 3.2.5

Mitigation steps: Update to TablePress plugin version 3.2.5 or greater.


Royal Addons for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-5092
Number of Installations: 600,000+
Affected Software: Royal Addons for Elementor <= 1.7.1031
Patched Versions: Royal Addons for Elementor 1.7.1032

Mitigation steps: Update to Royal Addons for Elementor plugin version 1.7.1032 or greater.


Royal Addons for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-6251
Number of Installations: 600,000+
Affected Software: Royal Addons for Elementor <= 1.7.1036
Patched Versions: Royal Addons for Elementor 1.7.1037

Mitigation steps: Update to Royal Addons for Elementor plugin version 1.7.1037 or greater.


YITH WooCommerce Wishlist – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-12777
Number of Installations: 500,000+
Affected Software: YITH WooCommerce Wishlist <= 4.10.0
Patched Versions: YITH WooCommerce Wishlist 4.10.1

Mitigation steps: Update to YITH WooCommerce Wishlist plugin version 4.10.1 or greater.


YITH WooCommerce Wishlist – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-12427
Number of Installations: 500,000+
Affected Software: YITH WooCommerce Wishlist <= 4.10.0
Patched Versions: YITH WooCommerce Wishlist 4.10.1

Mitigation steps: Update to YITH WooCommerce Wishlist plugin version 4.10.1 or greater.


SiteSEO – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-13085
Number of Installations: 400,000+
Affected Software: SiteSEO <= 1.3.2
Patched Versions: SiteSEO 1.3.3

Mitigation steps: Update to SiteSEO plugin version 1.3.3 or greater.


SiteSEO – Broken Authentication

Security Risk: Medium
Vulnerability: Broken Authentication
CVE: CVE-2025-12814
Number of Installations: 400,000+
Affected Software: SiteSEO <= 1.3.2
Patched Versions: SiteSEO 1.3.3

Mitigation steps: Update to SiteSEO plugin version 1.3.3 or greater.


SiteSEO – Broken Access Control

Security Risk: Low
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12367
Number of Installations: 400,000+
Affected Software: SiteSEO <= 1.3.1
Patched Versions: SiteSEO 1.3.2

Mitigation steps: Update to SiteSEO plugin version 1.3.2 or greater.


Post SMTP – Broken Authentication

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Broken Authentication
CVE: CVE-2025-11833
Number of Installations: 400,000+
Affected Software: Post SMTP <= 3.6.0
Patched Versions: Post SMTP 3.6.1

Mitigation steps: Update to Post SMTP plugin version 3.6.1 or greater.


Page Builder: Pagelayer – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-12366
Number of Installations: 400,000+
Affected Software: Page Builder: Pagelayer <= 2.0.5
Patched Versions: Page Builder: Pagelayer 2.0.6

Mitigation steps: Update to Page Builder: Pagelayer plugin version 2.0.6 or greater.


Broken Link Checker by AIOSEO – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11734
Number of Installations: 300,000+
Affected Software: Broken Link Checker by AIOSEO <= 1.2.5
Patched Versions: Broken Link Checker by AIOSEO 1.2.6

Mitigation steps: Update to Broken Link Checker by AIOSEO plugin version 1.2.6 or greater.


SureForms – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-12536
Number of Installations: 300,000+
Affected Software: SureForms <= 1.13.1
Patched Versions: SureForms 1.13.2

Mitigation steps: Update to SureForms plugin version 1.13.2 or greater.


WP Go Maps (formerly WP Google Maps) – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11307
Number of Installations: 300,000+
Affected Software: WP Go Maps (formerly WP Google Maps) <= 9.0.47
Patched Versions: WP Go Maps (formerly WP Google Maps) 9.0.48

Mitigation steps: Update to WP Go Maps (formerly WP Google Maps) plugin version 9.0.48 or greater.


Ad Inserter – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11745
Number of Installations: 300,000+
Affected Software: Ad Inserter <= 2.8.7
Patched Versions: Ad Inserter 2.8.8

Mitigation steps: Update to Ad Inserter plugin version 2.8.8 or greater.


Blocksy Companion – Arbitrary File Upload

Security Risk: Critical
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Arbitrary File Upload
CVE: CVE-2025-12846
Number of Installations: 300,000+
Affected Software: Blocksy Companion <= 2.1.19
Patched Versions: Blocksy Companion 2.1.20

Mitigation steps: Update to Blocksy Companion plugin version 2.1.20 or greater.


Post Type Switcher – Insecure Direct Object References (IDOR)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Insecure Direct Object References (IDOR)
CVE: CVE-2025-12524
Number of Installations: 200,000+
Affected Software: Post Type Switcher <= 4.0.0
Patched Versions: Post Type Switcher 4.0.1

Mitigation steps: Update to Post Type Switcher plugin version 4.0.1 or greater.


AI Engine – PHP Object Injection

Security Risk: High
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: PHP Object Injection
CVE: CVE-2025-12844
Number of Installations: 100,000+
Affected Software: AI Engine <= 3.1.8
Patched Versions: AI Engine 3.1.9

Mitigation steps: Update to AI Engine plugin version 3.1.9 or greater.


Element Pack Addons for Elementor – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-13196
Number of Installations: 100,000+
Affected Software: Element Pack Addons for Elementor <= 8.3.4
Patched Versions: Element Pack Addons for Elementor 8.3.5

Mitigation steps: Update to Element Pack Addons for Elementor plugin version 8.3.5 or greater.


Gallery Plugin for WordPress – Envira Photo Gallery – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12377
Number of Installations: 100,000+
Affected Software: Gallery Plugin for WordPress – Envira Photo Gallery <= 1.12.0
Patched Versions: Gallery Plugin for WordPress – Envira Photo Gallery 1.12.1

Mitigation steps: Update to Gallery Plugin for WordPress – Envira Photo Gallery plugin version 1.12.1 or greater.


Image Gallery – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12494
Number of Installations: 100,000+
Affected Software: Image Gallery <= 2.12.28
Patched Versions: Image Gallery 2.12.29

Mitigation steps: Update to Image Gallery plugin version 2.12.29 or greater.


VK All in One Expansion Unit – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11265
Number of Installations: 100,000+
Affected Software: VK All in One Expansion Unit <= 9.112.1
Patched Versions: VK All in One Expansion Unit 9.112.2

Mitigation steps: Update to VK All in One Expansion Unit plugin version 9.112.2 or greater.


Import any XML, CSV or Excel File to WordPress – Remote Code Execution (RCE)

Security Risk: Critical
Exploitation Level: Requires Administrator or higher level authentication.
Vulnerability: Remote Code Execution (RCE)
CVE: CVE-2025-12733
Number of Installations: 100,000+
Affected Software: Import any XML, CSV or Excel File to WordPress <= 3.7.5
Patched Versions: Import any XML, CSV or Excel File to WordPress 4.0.0

Mitigation steps: Update to Import any XML, CSV or Excel File to WordPress plugin version 4.0.0 or greater.


AI Engine – Privilege Escalation

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: Privilege Escalation
CVE: CVE-2025-11749
Number of Installations: 100,000+
Affected Software: AI Engine <= 3.1.3
Patched Versions: AI Engine 3.1.4

Mitigation steps: Update to AI Engine plugin version 3.1.4 or greater.


Popup and Slider Builder by Depicter – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11373
Number of Installations: 100,000+
Affected Software: Popup and Slider Builder by Depicter <= 4.0.4
Patched Versions: Popup and Slider Builder by Depicter 4.0.5

Mitigation steps: Update to Popup and Slider Builder by Depicter plugin version 4.0.5 or greater.


Download Manager – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-12177
Number of Installations: 100,000+
Affected Software: Download Manager <= 3.3.30
Patched Versions: Download Manager 3.3.31

Mitigation steps: Update to Download Manager plugin version 3.3.31 or greater.


Envira Photo Gallery – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-11448
Number of Installations: 100,000+
Affected Software: Envira Photo Gallery <= 1.11.9
Patched Versions: Envira Photo Gallery 1.12.0

Mitigation steps: Update to Envira Photo Gallery plugin version 1.12.0 or greater.


Orbit Fox – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12045
Number of Installations: 100,000+
Affected Software: Orbit Fox <= 3.0.2
Patched Versions: Orbit Fox 3.0.3

Mitigation steps: Update to Orbit Fox plugin version 3.0.3 or greater.


ShopLentor (formerly WooLentor) – Local File Inclusion

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Local File Inclusion
CVE: CVE-2025-12493
Number of Installations: 100,000+
Affected Software: ShopLentor (formerly WooLentor) <= 3.2.5
Patched Versions: ShopLentor (formerly WooLentor) 3.2.6

Mitigation steps: Update to ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin version 3.2.6 or greater.


Advanced Ads – Arbitrary Code Execution

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Arbitrary Code Execution
CVE: CVE-2025-10487
Number of Installations: 100,000+
Affected Software: Advanced Ads <= 2.0.12
Patched Versions: Advanced Ads 2.0.13

Mitigation steps: Update to Advanced Ads plugin version 2.0.13 or greater.


Schema & Structured Data for WP & AMP – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11502
Number of Installations: 100,000+
Affected Software: Schema & Structured Data for WP & AMP <= 1.51
Patched Versions: Schema & Structured Data for WP & AMP 1.52

Mitigation steps: Update to Schema & Structured Data for WP & AMP plugin version 1.52 or greater.


GiveWP – Cross Site Scripting (XSS)

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-13206
Number of Installations: 100,000+
Affected Software: GiveWP <= 4.13.0
Patched Versions: GiveWP 4.13.1

Mitigation steps: Update to GiveWP plugin version 4.13.1 or greater.


PublishPress Future – Broken Access Control

Security Risk: Low
Exploitation Level: Requires Author or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-13149
Number of Installations: 100,000+
Affected Software: PublishPress Future <= 4.9.1
Patched Versions: PublishPress Future 4.9.2

Mitigation steps: Update to PublishPress Future plugin version 4.9.2 or greater.


Amelia – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2023-49282
Number of Installations: 90,000+
Affected Software: Amelia <= 1.2.36
Patched Versions: Amelia 1.2.37

Mitigation steps: Update to Amelia plugin version 1.2.37 or greater.


Amelia – SQL Injection

Security Risk: Critical
Exploitation Level: No authentication required.
Vulnerability: SQL Injection
CVE: CVE-2025-12482
Number of Installations: 90,000+
Affected Software: Amelia <= 1.2.35
Patched Versions: Amelia 1.2.36

Mitigation steps: Update to Amelia plugin version 1.2.36 or greater.


Strong Testimonials – Content Injection

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Content Injection
CVE: CVE-2025-11268
Number of Installations: 90,000+
Affected Software: Strong Testimonials <= 3.2.16
Patched Versions: Strong Testimonials 3.2.17

Mitigation steps: Update to Strong Testimonials plugin version 3.2.17 or greater.


List category posts – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-11377
Number of Installations: 90,000+
Affected Software: List category posts <= 0.92.9
Patched Versions: List category posts 0.93.0

Mitigation steps: Update to List category posts plugin version 0.93.0 or greater.


List category posts – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-11377
Number of Installations: 80,000+
Affected Software: List category posts <= 0.92.9
Patched Versions: List category posts 0.93.0

Mitigation steps: Update to List category posts plugin version 0.93.0 or greater.


HT Mega – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-13141
Number of Installations: 80,000+
Affected Software: HT Mega <= 3.0.0
Patched Versions: HT Mega 3.0.1

Mitigation steps: Update to HT Mega plugin version 3.0.1 or greater.


LearnPress – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11368
Number of Installations: 80,000+
Affected Software: LearnPress <= 4.2.5.9
Patched Versions: LearnPress 4.3.0

Mitigation steps: Update to LearnPress plugin version 4.3.0 or greater.


Email Subscribers & Newsletters – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-12349
Number of Installations: 70,000+
Affected Software: Email Subscribers & Newsletters <= 5.9.10
Patched Versions: Email Subscribers & Newsletters 5.9.11

Mitigation steps: Update to Email Subscribers & Newsletters plugin version 5.9.11 or greater.


FluentCRM – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-12935
Number of Installations: 70,000+
Affected Software: FluentCRM <= 2.9.84
Patched Versions: FluentCRM 2.9.85

Mitigation steps: Update to FluentCRM plugin version 2.9.85 or greater.


Greenshift – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-11841
Number of Installations: 60,000+
Affected Software: Greenshift <= 12.2.7
Patched Versions: Greenshift 12.2.8

Mitigation steps: Update to Greenshift plugin version 12.2.8 or greater.


Qi Blocks – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12180
Number of Installations: 60,000+
Affected Software: Qi Blocks <= 1.4.3
Patched Versions: Qi Blocks 1.4.4

Mitigation steps: Update to Qi Blocks plugin version 1.4.4 or greater.


Qi Blocks – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12182
Number of Installations: 60,000+
Affected Software: Qi Blocks <= 1.4.3
Patched Versions: Qi Blocks 1.4.4

Mitigation steps: Update to Qi Blocks plugin version 1.4.4 or greater.


Premium Portfolio Features for Phlox theme – Local File Inclusion

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Local File Inclusion
CVE: CVE-2025-12497
Number of Installations: 50,000+
Affected Software: Premium Portfolio Features for Phlox theme <= 2.3.11
Patched Versions: Premium Portfolio Features for Phlox theme 2.3.12

Mitigation steps: Update to Premium Portfolio Features for Phlox theme plugin version 2.3.12 or greater.


Blog2Social – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-13558
Number of Installations: 50,000+
Affected Software: Blog2Social <= 8.7.0
Patched Versions: Blog2Social 8.7.1

Mitigation steps: Update to Blog2Social plugin version 8.7.1 or greater.


Blog2Social – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12563
Number of Installations: 50,000+
Affected Software: Blog2Social <= 8.6.0
Patched Versions: Blog2Social 8.6.1

Mitigation steps: Update to Blog2Social plugin version 8.6.1 or greater.


Easy Digital Downloads – Broken Access Control

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-11271
Number of Installations: 50,000+
Affected Software: Easy Digital Downloads <= 3.5.2
Patched Versions: Easy Digital Downloads 3.5.3

Mitigation steps: Update to Easy Digital Downloads plugin version 3.5.3 or greater.


Quick Featured Images – SQL Injection

Security Risk: High
Exploitation Level: Requires Editor or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2025-11980
Number of Installations: 50,000+
Affected Software: Quick Featured Images <= 13.7.3
Patched Versions: Quick Featured Images 13.7.4

Mitigation steps: Update to Quick Featured Images plugin version 13.7.4 or greater.


Better Find and Replace – Arbitrary Code Execution

Security Risk: High
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Arbitrary Code Execution
CVE: CVE-2025-9334
Number of Installations: 50,000+
Affected Software: Better Find and Replace <= 1.7.7
Patched Versions: Better Find and Replace 1.7.8

Mitigation steps: Update to Better Find and Replace plugin version 1.7.8 or greater.


Better Find and Replace – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Subscriber or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12360
Number of Installations: 50,000+
Affected Software: Better Find and Replace <= 1.7.7
Patched Versions: Better Find and Replace 1.7.8

Mitigation steps: Update to Better Find and Replace plugin version 1.7.8 or greater.


Tag, Category, and Taxonomy Manager – SQL Injection

Security Risk: High
Exploitation Level: Requires Editor or higher level authentication.
Vulnerability: SQL Injection
CVE: CVE-2025-11972
Number of Installations: 50,000+
Affected Software: Tag, Category, and Taxonomy Manager <= 3.40.0
Patched Versions: Tag, Category, and Taxonomy Manager 3.40.1

Mitigation steps: Update to Tag, Category, and Taxonomy Manager plugin version 3.40.1 or greater.


Booking Calendar – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-64381
Number of Installations: 50,000+
Affected Software: Booking Calendar <= 10.14.7
Patched Versions: Booking Calendar 10.14.8

Mitigation steps: Update to Booking Calendar plugin version 10.14.8 or greater.


Live sales notification for WooCommerce – Broken Access Control

Security Risk: High
Exploitation Level: No authentication required.
Vulnerability: Broken Access Control
CVE: CVE-2025-12955
Number of Installations: 50,000+
Affected Software: Live sales notification for WooCommerce <= 2.3.39
Patched Versions: Live sales notification for WooCommerce 2.3.40

Mitigation steps: Update to Live sales notification for WooCommerce plugin version 2.3.40 or greater.


Pixel Manager for WooCommerce – Sensitive Data Exposure

Security Risk: Medium
Exploitation Level: No authentication required.
Vulnerability: Sensitive Data Exposure
CVE: CVE-2025-12545
Number of Installations: 50,000+
Affected Software: Pixel Manager for WooCommerce <= 1.49.2
Patched Versions: Pixel Manager for WooCommerce 1.49.3

Mitigation steps: Update to Pixel Manager for WooCommerce plugin version 1.49.3 or greater.


WP Duplicate Page – Broken Access Control

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Broken Access Control
CVE: CVE-2025-12481
Number of Installations: 50,000+
Affected Software: WP Duplicate Page <= 1.7
Patched Versions: WP Duplicate Page 1.8

Mitigation steps: Update to WP Duplicate Page plugin version 1.8 or greater.


User Profile Builder – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-13054
Number of Installations: 50,000+
Affected Software: User Profile Builder <= 3.14.8
Patched Versions: User Profile Builder 3.14.9

Mitigation steps: Update to User Profile Builder plugin version 3.14.9 or greater.


Themes


OnePress – Cross Site Scripting (XSS)

Security Risk: Medium
Exploitation Level: Requires Contributor or higher level authentication.
Vulnerability: Cross Site Scripting (XSS)
CVE: CVE-2025-5092
Number of Downloads: 2,469,341
Affected Software: OnePress (all versions)
Patched Versions: No fix available

Mitigation steps: Consider switching to an alternative theme, as no patch is currently available for OnePress. Disable or remove the theme if possible.


Update your website software to mitigate risk. Users who are not able to update their software with the latest version are encouraged to use a web application firewall to help virtually patch known vulnerabilities and protect their website.

You May Also Like