Vulnerabilities protected by our XSS: Cross Site Scripting firewall rule

33,699,817
Attacks Blocked in Past 24 Hours

Showing 21-40 of 6,132 Vulnerabilities

Title CVE ID CVSS Vector Date
Fancy Product Designer <= 6.1.7 - Reflected Cross-Site Scripting CVE-2024-0905 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 26, 2024
WPC Composite Products for WooCommerce <= 7.2.7 - Authenticated (Subscriber+) Stored Cross-Site Scripting CVE-2024-2838 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 26, 2024
Meks Smart Social Widget <= 1.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-33693 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 26, 2024
Jeg Elementor Kit <= 2.6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via JKit - Banner CVE-2024-3819 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 26, 2024
Fan Page Widget by ThemeNcode <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-33695 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 26, 2024
CF7 File Download – File Download for CF7 <= 2.0 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-33697 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 26, 2024
Filterable Portfolio <= 1.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-4234 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 26, 2024
XStore <= 9.3.5 - Reflected Cross-Site Scripting CVE-2024-33562 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
WooCommerce Amazon Affiliates - Wordpress Plugin <= 14.0.10 - Reflected Cross-Site Scripting CVE-2024-33548 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
Easy Set Favicon <= 1.1 - Reflected Cross-Site Scripting CVE-2024-33645 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
Header Footer Code Manager Pro <= 1.0.16 - Reflected Cross-Site Scripting via message CVE-2024-3473 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
VOD Infomaniak <= 1.5.6 - Reflected Cross-Site Scripting CVE-2024-33571 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
Sticky Anything <= 2.1.5 - Missing Authorization CVE-2024-33646 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N April 25, 2024
Happy Addons for Elementor <= 3.10.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via Calendly Widget CVE-2024-3890 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 25, 2024
Piotnet Addons For Elementor Pro <= 7.1.17 - Reflected Cross-Site Scripting CVE-2024-33633 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
PopupAlly <= 2.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-33639 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 25, 2024
Advanced Post List <= 0.5.6.1 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2024-33642 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 25, 2024
XStore Core <= 5.3.5 - Reflected Cross-Site Scripting CVE-2024-33554 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2024
WP Portfolio <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-33537 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 25, 2024
Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) <= 3.5.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Sina Fancy Text Widget CVE-2024-3988 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 24, 2024

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation