A vulnerability was found in mariusz88atelierweb Atelier Create CV Plugin up to 1.1.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-49439. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Shahjada Premium Packages Plugin up to 6.0.2 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-30991. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Chris McCoy Bacon Ipsum Plugin up to 2.4 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-49443. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in mhallmann SEPA Girocode Plugin up to 0.5.1 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-49450. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Ryan Burnette Abbie Expander Plugin up to 1.0.1 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-49427. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Alessandro Piconi Simple Keyword to Link Plugin up to 1.5 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-30980. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in Mostafa Shahiri Simple Nested Menu Plugin up to 1.0 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-49442. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Ryan Burnette Video Embeds Plugin up to 0.1.1 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-49429. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Emraan Cheema CubeWP Plugin up to 1.1.23 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-30994. The attack may be initiated remotely. There is no exploit available.
When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost productivity, streamline communication and accelerate work. Like so many waves of consumer-first IT innovation before it—file sharing, cloud storage and collaboration platforms—AI landed in
A vulnerability was found in Booqable Rental Plugin up to 2.4.20 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-30956. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in wpdive Nexa Blocks Plugin up to 1.1.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-30952. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Stiofan BlockStrap Page Builder Plugin up to 0.1.36 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-30951. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Michael Cannon Custom Bulk Quick Edit Plugin up to 1.6.10 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-30946. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Taskbuilder Plugin up to 4.0.3 on WordPress. This issue affects some unknown processing. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2025-30945. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic was found in Debashish IFrame Widget Plugin up to 4.1 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-30939. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in NickDuncan Contact Form Plugin up to 2.0.12 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-30935. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Giraphix Creative Layouts for Elementor Plugin up to 1.11 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-30948. It is possible to initiate the attack remotely. There is no exploit available.