A vulnerability labeled as critical has been found in All In One Image Viewer Block Plugin up to 1.0.2 on WordPress. This issue affects some unknown processing of the component REST API Endpoint. Such manipulation leads to server-side request forgery.
This vulnerability is referenced as CVE-2026-1294. It is possible to launch the attack remotely. No exploit is available.
A vulnerability identified as problematic has been detected in Robin Image Optimizer Plugin up to 2.0.2 on WordPress. This vulnerability affects unknown code. This manipulation of the argument Image Alternative Text causes cross site scripting.
The identification of this vulnerability is CVE-2026-1319. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in ProfileGrid Plugin up to 5.9.7.2 on WordPress. It has been rated as problematic. Affected by this issue is the function pm_deactivate_user_from_group. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-13416. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Greenshift Plugin up to 12.5.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function greenshift_app_pass_validation of the component AI API Key Handler. Executing a manipulation can lead to information disclosure.
This vulnerability is handled as CVE-2026-1927. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Peters Date Countdown Plugin up to 2.0.0 on WordPress. It has been classified as problematic. Affected is an unknown function. Performing a manipulation of the argument $_SERVER['PHP_SELF'] results in cross site scripting.
This vulnerability is known as CVE-2026-1654. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in ProfileGrid Plugin up to 5.9.7.2 on WordPress and classified as problematic. This impacts the function update_user_meta of the file public/partials/crop.php of the component Image Handler. Such manipulation leads to improper control of resource identifiers.
This vulnerability is traded as CVE-2026-1271. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Nukegraphic CMS 3.1.2 and classified as problematic. This affects an unknown function of the file /ngc-cms/user-edit-profile.php. This manipulation of the argument Name causes cross site scripting.
This vulnerability appears as CVE-2026-1953. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as problematic, was found in brechtvds Dynamic Widget Content Plugin up to 1.3.6 on WordPress. The impacted element is an unknown function. The manipulation of the argument widget content results in cross site scripting.
This vulnerability is reported as CVE-2026-1268. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in catchthemes Essential Widgets Plugin up to 3.0 on WordPress. The affected element is the function ew-author/ew-archive/ew-category/ew-page/ew-menu. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-0867. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in ShortPixel Image Optimizer Plugin up to 6.4.2 on WordPress. Impacted is an unknown function. Executing a manipulation of the argument loadFile can lead to path traversal.
This vulnerability is registered as CVE-2026-1246. It is possible to launch the attack remotely. No exploit is available.