Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024)


📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.


Last week, there were 44 vulnerabilities disclosed in 38 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 24 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our PremiumCare, and Response customers last week:

Wordfence PremiumCare, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Patched 34
Unpatched 10

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Medium Severity 30
High Severity 10
Critical Severity 4

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 13
Missing Authorization 11
Exposure of Sensitive Information to an Unauthorized Actor 4
Authorization Bypass Through User-Controlled Key 3
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) 3
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) 2
Improper Privilege Management 2
External Control of Assumed-Immutable Web Parameter 1
Improper Authentication 1
Improper Control of Generation of Code (‘Code Injection’) 1
Insertion of Sensitive Information into Log File 1
Unrestricted Upload of File with Dangerous Type 1
Use of Less Trusted Source 1

Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
7
7
4
3
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Advanced Sermons advanced-sermons
Attributes for Blocks attributes-for-blocks
Big File Uploads – Increase Maximum File Upload Size tuxedo-big-file-uploads
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress file-manager
Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed blockspare
Booking for Appointments and Events Calendar – Amelia ameliabooking
Booking for Appointments and Events Calendar – Amelia Premium ameliabooking
Cab fare calculator cab-fare-calculator
Cost Calculator Builder PRO cost-calculator-builder-pro
Customizer Export/Import customizer-export-import
Dynamic Featured Image dynamic-featured-image
Enter Addons – Ultimate Template Builder for Elementor enteraddons
Form Vibes – Database Manager for Forms form-vibes
ForumWP – Forum & Discussion Board Plugin forumwp
Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin frontend-post-submission-manager-lite
Geo Controller cf-geoplugin
HelloAsso helloasso
Ivory Search – WordPress Search Plugin add-search-to-menu
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes lifterlms
LiteSpeed Cache litespeed-cache
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution dc-woocommerce-multi-vendor
Newsletters newsletters-lite
Ninja Forms – File Uploads ninja-forms-uploads
Pinpoint Booking System – #1 WordPress Booking Plugin booking-system
PixelYourSite Pro – Your smart PIXEL (TAG) Manager pixelyoursite-pro
PixelYourSite – Your smart PIXEL (TAG) & API Manager pixelyoursite
Preloader Plus – WordPress Loading Screen Plugin preloader-plus
RD Station integracao-rd-station
Remember Me Controls remember-me-controls
Revision Manager TMC revision-manager-tmc
Secure Downloads secure-downloads
Security, Antivirus, Firewall – S.A.F security-antivirus-firewall
Share This Image share-this-image
The Ultimate WordPress Toolkit – WP Extended wpextended
WP AdCenter – Ad Manager & Adsense Ads wpadcenter
WP Job Portal – A Complete Recruitment System for Company or Job Board website wp-job-portal
WP-Recall – Registration, Profile, Commerce & More wp-recall
WPCOM Member wpcom-member

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-7493
Patch Status
Patched
Published
Sep 6, 2024

Affected Software
WPCOM Member
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8247
Patch Status
Patched
Published
Sep 5, 2024

Affected Software
Newsletters
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-7112
Patch Status
Patched
Published
Sep 6, 2024

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8102
Patch Status
Patched
Published
Sep 3, 2024

CVSS Rating
High (7.5)
CVE-ID
CVE-2024-44000
Patch Status
Patched
Published
Sep 5, 2024

Affected Software
LiteSpeed Cache
Researcher

CVSS Rating
High (7.2)
CVE-ID
CVE-2024-7349
Patch Status
Patched
Published
Sep 5, 2024

CVSS Rating
High (7.2)
CVE-ID
CVE-2024-1596
Patch Status
Patched
Published
Sep 6, 2024

Affected Software
Ninja Forms – File Uploads
Researcher

CVSS Rating
Medium (6.6)
CVE-ID
CVE-2024-7620
Patch Status
Patched
Published
Sep 6, 2024

Affected Software
Customizer Export/Import
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-7599
Patch Status
Patched
Published
Sep 5, 2024

Affected Software
Advanced Sermons
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8318
Patch Status
Patched
Published
Sep 3, 2024

Affected Software
Attributes for Blocks
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6929
Patch Status
Unpatched
Published
Sep 4, 2024

Affected Software
Dynamic Featured Image
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6894
Patch Status
Patched
Published
Sep 4, 2024

Affected Software
RD Station
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8363
Patch Status
Patched
Published
Sep 4, 2024

Affected Software
Share This Image
Researcher

CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8119
Patch Status
Patched
Published
Sep 3, 2024

CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8117
Patch Status
Patched
Published
Sep 3, 2024

CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-5309
Patch Status
Patched
Published
Sep 4, 2024

CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8123
Patch Status
Patched
Published
Sep 3, 2024

CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8121
Patch Status
Patched
Published
Sep 3, 2024

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6010
Patch Status
Unpatched
Published
Sep 6, 2024

Affected Software
Cost Calculator Builder PRO
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7381
Patch Status
Unpatched
Published
Sep 4, 2024

Affected Software
Geo Controller
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6835
Patch Status
Patched
Published
Sep 4, 2024

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7415
Patch Status
Patched
Published
Sep 5, 2024

Affected Software
Remember Me Controls
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2022-4529
Patch Status
Unpatched
Published
Sep 4, 2024

Researcher

CVSS Rating
Medium (4.9)
CVE-ID
CVE-2024-8031
Patch Status
Patched
Published
Sep 3, 2024

Affected Software
Secure Downloads
Researcher

CVSS Rating
Medium (4.4)
CVE-ID
CVE-2022-3556
Patch Status
Unpatched
Published
Sep 4, 2024

Affected Software
Cab fare calculator
Researcher

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-8538
Patch Status
Patched
Published
Sep 6, 2024

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7380
Patch Status
Unpatched
Published
Sep 4, 2024

Affected Software
Geo Controller
Researcher

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7605
Patch Status
Patched
Published
Sep 4, 2024

Affected Software
HelloAsso
Researcher

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7622
Patch Status
Patched
Published
Sep 6, 2024

Affected Software
Revision Manager TMC
Researcher


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024) appeared first on Wordfence.

More great articles

WordPress Vulnerability & Patch Roundup August 2023

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are…

Read Story

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 1, 2024 to April 7, 2024)

Did you know we’re running a Bug Bounty Extravaganza again? Earn over 6x our usual bounty rates, up to $10,000, for…

Read Story

WordPress 5.8.3 Security Release

On January 6, 2022, the WordPress core team released WordPress version 5.8.3, which contains security patches for 4 high-severity vulnerabilities.…

Read Story

Emergency WordPress Help

One of our techs will get back to you within minutes.