We have compiled a list of the six most targeted WordPress plugin vulnerabilities in recent years. If you have any of these plugins installed on your site (enabled or disabled), we recommend that you update to the latest version or remove them if you are not using them.

No. 1 WooCommerce Designer Pro 1.9.26 or lower

This vulnerability in WooCommerce Designer Pro 1.9.26 and below is a very dangerous vulnerability that allows the deletion of arbitrary WordPress files. The attack is done by sending action=wcdp_save_canvas_design_ajax to admin-ajax.php (the file for WordPress AJAX functions).

Vulnerability information is available at
https://wp-doctor.jp/blog/vulnerabilities/wc-designer-pro-exploit-cve-2025-6439/

No. 2 Automatic by ValvePress 3.92.0 and below

The vulnerability in Automatic by ValvePress allows a database to be rewritten through an SQL injection attack. It is believed that this vulnerability is used to generate unauthorized WordPress users.
The hacker carries out the attack by sending arbitrary malformed SQL statements to the following file.
/wp-content/plugins/wp-automatic/inc/csv.php

For more vulnerability information, please visit
https://wp-doctor.jp/blog/vulnerabilities/wp-automatic-exploit-cve-2024-27956/

3rd WordPress Duplicator 1.3.28 and below

The vulnerability in this plugin allows hackers to download and view arbitrary files on WordPress. The attack sends the query action duplicator_download to admin-ajax.php (the file for WordPress AJAX functions) and the path to the download file to download an arbitrary file.
If wp-config.php is downloaded, the password for connecting to the database, etc. will be exposed, and unauthorized users may be added or content may be rewritten.

Vulnerability information can be found here
https://wp-doctor.jp/blog/vulnerabilities/duplicator-exploit-cve-2020-11738/

No. 4 ProfilePress 3.1.3 and below

This plugin vulnerability allows hackers to register arbitrary unauthorized admin users to the site. The attack is performed by sending an invalid query to the action pp_ajax_signup in admin-ajax.php (the file for WordPress AJAX functions).

Vulnerability information is available at
https://wp-doctor.jp/blog/vulnerabilities/wp-user-avatar-exploit-cve-2021-34621/

No. 5 Simple File List 3.2.7 and below

The vulnerability in this plugin allows hackers to download and view arbitrary files on WordPress.
An unauthorized query could be sent to the following files, allowing hackers to download and view arbitrary files
/wp-content/plugins/simple-file-list/includes/ee-downloader.php

For vulnerability information, please visit
https://wp-doctor.jp/blog/vulnerabilities/simple-file-list-exploit-cve-2022-1119/

6th File Manager 6.9 and below

If exploited, this plugin vulnerability could allow a hacker to execute arbitrary code on a WordPress site by uploading and executing a malicious file.

Malicious queries will be sent to the following files and malicious files will be generated on the server.
/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php

For vulnerability information, please visit
https://wp-doctor.jp/blog/vulnerabilities/wp-file-manager-exploit-cve-2020-25213/

If your site has been infected with malware, you can use the plugin to perform malware scanning and removal.
Free] WordPress:Malware Scan & Security Plugin [Malware and Virus Detection and Removal].

Terms of Use for Generated AI

This page prohibits the use, quotation, or summarization of any page, in whole or in part, by the Generated AI. However, if the following conditions are met, the specification of content using generated AI is permitted.
1. it is not for the purpose of learning by the generated AI. 2. only the summary or title of the page content at a level that does not lead to the solution of the user’s problem is shown to the user. 3. in the case of 2, a link to this content is shown to lead the user to this page.