Monitor vulnerabilities that affect your stack. Sign up free to get alerts when software you use is affected.

CVE Vulnerabilities - 21 March 2026

RSS

131 vulnerabilities published on 21 March 2026

Severity:
Pre* Party Resource Hints plugin for WordPress allows hackers to steal data
CVE-2026-4087
The Pre* Party Resource Hints plugin, used in WordPress sites, has a security flaw that lets hackers with Subscriber-level access steal sensitive information from the database. This is because the plu...
6.5
Task Manager Plugin for WordPress Can Let Attackers Execute Malicious Code
CVE-2026-4004
The Task Manager plugin for WordPress is vulnerable to attacks from authenticated users with Subscriber-level access or higher, allowing them to execute malicious code on the site. This can happen if ...
6.5
Hr Press Lite Plugin Leaks Employee Data for Authorized Users
CVE-2026-2720
The Hr Press Lite plugin for WordPress stores employee data insecurely. This means that any authorized user can see sensitive information about coworkers, including names, contact details, and salary....
6.5
ElementCamp WordPress Plugin Allows Attackers to Steal Data
CVE-2026-2503
The ElementCamp plugin for WordPress has a security flaw that allows attackers to extract sensitive information from the database. Anyone with Author-level access or above can exploit this issue, whic...
6.5
App Builder WordPress Plugin: Unauthenticated Vendor Account Creation
CVE-2026-2375
An attacker can create a vendor account on your website without permission, gaining access to sensitive areas of your store. This could allow them to manage products, orders, and other vendor function...
6.5
Task Manager Plugin for WordPress: Unauthorized File Access on All Versions up to 3.0.2
CVE-2026-2351
The Task Manager plugin for WordPress can allow an attacker with a subscriber account or higher to read sensitive files on the server. This could lead to the exposure of confidential information. Upda...
6.5
Post Affiliate Pro plugin for WordPress allows attackers to make unauthorized requests
CVE-2026-2290
Authenticated attackers with admin access can make external requests and access response data. This could allow them to steal sensitive information or disrupt third-party services. Update to version 1...
6.5
OpenClaw Prior to 2026.2.25: Local File Overwrite Risk
CVE-2026-32054
An attacker with local access to your system can use OpenClaw's browser trace and download feature to write files outside the intended directory, potentially overwriting important system files. This c...
5.9
Twilio Webhook Events Can Be Replayable in OpenClaw
CVE-2026-32053
If you're using OpenClaw versions prior to 2026.2.23, an attacker could potentially send old or duplicate Twilio event messages, causing your system to handle calls incorrectly or become corrupted. Th...
6.9
OpenClaw, versions before 2026.2.25: Malicious File Execution Risk
CVE-2026-32043
OpenClaw users are at risk of executing malicious files on their systems if an attacker manipulates a symbolic link. This can happen if a user approves a job with a validated path, but the actual path...
5.9
WP Random Button plugin: Malicious scripts can be injected in pages
CVE-2026-4086
The WP Random Button plugin for WordPress is affected. If an attacker with Contributor-level access or higher injects malicious code into pages, it can be executed when users visit those pages. To pro...
6.4
Fyyd Podcast Plugin for WordPress Allows Malicious Scripts in Podcast Pages
CVE-2026-4084
A security issue in the Fyyd Podcast Plugin for WordPress allows attackers with Contributor-level access to inject malicious code into podcast pages. This could happen when a user views a page with a ...
6.4
Ecover Builder For Dummies plugin allows attackers to inject malicious scripts in WordPress pages
CVE-2026-4077
The Ecover Builder For Dummies plugin for WordPress has a security flaw that can allow hackers to inject malicious scripts into pages. This could potentially harm website users. Update to the latest v...
6.4
WordPress PayPal Donation plugin allows attackers to inject malicious scripts
CVE-2026-4072
If an attacker with contributor access edits the 'donate' shortcode, they can inject malicious scripts that will run on any page a user views. This can happen if you use the affected plugin version on...
6.4
Ad Short plugin for WordPress: Malicious ads can inject malicious scripts
CVE-2026-4067
The Ad Short plugin for WordPress is used by attackers to inject malicious scripts into pages. This can happen when a user with contributor access or higher edits a page with an 'ad' shortcode. To fix...
6.4
WordPress Plugin Allows Attackers to Inject Malicious Scripts
CVE-2026-4022
The Show Posts list plugin for WordPress is vulnerable to a security flaw that allows attackers with contributor-level access or higher to inject malicious scripts into web pages. This can happen when...
6.4
Text Toggle plugin in WordPress lets attackers inject malicious scripts
CVE-2026-3997
The Text Toggle plugin for WordPress is vulnerable to a security flaw that allows attackers to inject malicious code into website pages. This can happen when a user with Contributor-level access or hi...
6.4
WP Games Embed plugin for WordPress allows attackers to inject malicious scripts
CVE-2026-3996
The WP Games Embed plugin for WordPress is vulnerable to a security threat that allows attackers to inject malicious scripts into web pages. This could happen if an authorized user with contributor ac...
6.4
WordPress Sheets2Table Plugin Allows Attackers to Inject Web Scripts
CVE-2026-3619
The Sheets2Table plugin for WordPress is vulnerable to a security threat that allows attackers to inject malicious code into web pages. This can happen when an authenticated user with Contributor-leve...
6.4
Paypal Shortcode Plugin for WordPress Allows Malicious Script Injection
CVE-2026-3617
The Paypal Shortcode plugin for WordPress can be exploited by authenticated users with Contributor-level access to inject malicious scripts on certain pages, potentially affecting the security of your...
6.4
Sherk Custom Post Type Displays plugin for WordPress injects malicious scripts if attacker edits a post
CVE-2026-3554
This affects all versions up to 1.2.1 of the Sherk Custom Post Type Displays plugin for WordPress. If an attacker with contributor-level access edits a post, they can inject malicious scripts that wil...
6.4
MinhNhut Link Gateway Plugin for WordPress Allows Attackers to Inject Malicious Scripts
CVE-2026-3333
The MinhNhut Link Gateway plugin for WordPress is at risk because an attacker with a certain level of access can inject malicious code into pages. This could potentially let an attacker take control o...
6.4
Ed's Social Share plugin for WordPress allows hackers to inject malicious code
CVE-2026-2501
The Ed's Social Share plugin for WordPress, used in sites with contributor-level access and above, is vulnerable to a security flaw that allows attackers to inject malicious scripts into web pages. Th...
6.4
Ed's Font Awesome Plugin for WordPress Allows Injected Scripts
CVE-2026-2496
The Ed's Font Awesome plugin for WordPress is vulnerable to a security threat that lets attackers inject malicious scripts into website pages. This can happen when an attacker with contributor access ...
6.4
FuseDesk Plugin for WordPress: Stored XSS via Email Text in Shortcode
CVE-2026-1914
The FuseDesk plugin for WordPress allows attackers with contributor-level access to inject malicious code into pages, which can execute when users visit those pages. This can lead to unauthorized acti...
6.4