Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.
Last week, there were 44 vulnerabilities disclosed in 38 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 24 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
- ForumWP – Forum & Discussion Board Plugin <= 2.0.2 – Insecure Direct Object Reference to Authenticated (Subscriber+) Privilege Escalation via Account Takeover
- WP-Recall – Registration, Profile, Commerce & More <= 16.26.8 – Insecure Direct Object Reference to Unauthenticated Arbitrary Password Update
- The Ultimate WordPress Toolkit – WP Extended <= 3.0.8 – Authenticated (Subscriber+) Sensitive Information Exposure and Arbitrary Options Update
- WAF-RULE-738 – Data redacted while we work with the vendor on a patch.
- WAF-RULE-734 – Data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status | Number of Vulnerabilities |
---|---|
Patched | 34 |
Unpatched | 10 |
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating | Number of Vulnerabilities |
---|---|
Medium Severity | 30 |
High Severity | 10 |
Critical Severity | 4 |
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE | Number of Vulnerabilities |
---|---|
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 13 |
Missing Authorization | 11 |
Exposure of Sensitive Information to an Unauthorized Actor | 4 |
Authorization Bypass Through User-Controlled Key | 3 |
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) | 3 |
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | 2 |
Improper Privilege Management | 2 |
External Control of Assumed-Immutable Web Parameter | 1 |
Improper Authentication | 1 |
Improper Control of Generation of Code (‘Code Injection’) | 1 |
Insertion of Sensitive Information into Log File | 1 |
Unrestricted Upload of File with Dangerous Type | 1 |
Use of Less Trusted Source | 1 |
Researchers That Contributed to WordPress Security Last Week
Researcher Name | Number of Vulnerabilities |
---|---|
7 | |
7 | |
4 | |
3 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name | Software Slug |
---|---|
Advanced Sermons | advanced-sermons |
Attributes for Blocks | attributes-for-blocks |
Big File Uploads – Increase Maximum File Upload Size | tuxedo-big-file-uploads |
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress | file-manager |
Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed | blockspare |
Booking for Appointments and Events Calendar – Amelia | ameliabooking |
Booking for Appointments and Events Calendar – Amelia Premium | ameliabooking |
Cab fare calculator | cab-fare-calculator |
Cost Calculator Builder PRO | cost-calculator-builder-pro |
Customizer Export/Import | customizer-export-import |
Dynamic Featured Image | dynamic-featured-image |
Enter Addons – Ultimate Template Builder for Elementor | enteraddons |
Form Vibes – Database Manager for Forms | form-vibes |
ForumWP – Forum & Discussion Board Plugin | forumwp |
Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin | frontend-post-submission-manager-lite |
Geo Controller | cf-geoplugin |
HelloAsso | helloasso |
Ivory Search – WordPress Search Plugin | add-search-to-menu |
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes | lifterlms |
LiteSpeed Cache | litespeed-cache |
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution | dc-woocommerce-multi-vendor |
Newsletters | newsletters-lite |
Ninja Forms – File Uploads | ninja-forms-uploads |
Pinpoint Booking System – #1 WordPress Booking Plugin | booking-system |
PixelYourSite Pro – Your smart PIXEL (TAG) Manager | pixelyoursite-pro |
PixelYourSite – Your smart PIXEL (TAG) & API Manager | pixelyoursite |
Preloader Plus – WordPress Loading Screen Plugin | preloader-plus |
RD Station | integracao-rd-station |
Remember Me Controls | remember-me-controls |
Revision Manager TMC | revision-manager-tmc |
Secure Downloads | secure-downloads |
Security, Antivirus, Firewall – S.A.F | security-antivirus-firewall |
Share This Image | share-this-image |
The Ultimate WordPress Toolkit – WP Extended | wpextended |
WP AdCenter – Ad Manager & Adsense Ads | wpadcenter |
WP Job Portal – A Complete Recruitment System for Company or Job Board website | wp-job-portal |
WP-Recall – Registration, Profile, Commerce & More | wp-recall |
WPCOM Member | wpcom-member |
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
Critical (9.8)
CVE-2024-8289
Patched
Sep 3, 2024
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution
Critical (9.8)
CVE-2024-7950
Patched
Sep 3, 2024
Critical (9.8)
CVE-2024-8292
Patched
Sep 5, 2024
WP-Recall – Registration, Profile, Commerce & More
Critical (9.8)
CVE-2024-7493
Patched
Sep 6, 2024
WPCOM Member
High (8.8)
CVE-2024-8428
Unpatched
Sep 6, 2024
ForumWP – Forum & Discussion Board Plugin
High (8.8)
CVE-2024-8247
Patched
Sep 5, 2024
Newsletters
High (8.8)
CVE-2024-7112
Patched
Sep 6, 2024
Pinpoint Booking System – #1 WordPress Booking Plugin
High (8.8)
CVE-2024-8102
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
High (8.8)
CVE-2024-8104
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
High (8.1)
CVE-2024-7627
Patched
Sep 4, 2024
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress
High (7.5)
CVE-2024-44000
Patched
Sep 5, 2024
LiteSpeed Cache
High (7.5)
CVE-2024-8289
Patched
Sep 3, 2024
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution
High (7.2)
CVE-2024-7349
Patched
Sep 5, 2024
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes
Ninja Forms File Uploads <= 3.3.16 – Unauthenticated Stored Cross-Site Scripting via File Upload
High (7.2)
CVE-2024-1596
Patched
Sep 6, 2024
Ninja Forms – File Uploads
Medium (6.6)
CVE-2024-7620
Patched
Sep 6, 2024
Customizer Export/Import
Medium (6.5)
CVE-2024-6332
Unpatched
Sep 4, 2024
Medium (6.5)
CVE-2024-7870
Patched
Sep 3, 2024
PixelYourSite Pro – Your smart PIXEL (TAG) Manager
PixelYourSite – Your smart PIXEL (TAG) & API Manager
Medium (6.5)
CVE-2024-8106
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
Medium (6.4)
CVE-2024-7599
Patched
Sep 5, 2024
Advanced Sermons
Medium (6.4)
CVE-2024-8318
Patched
Sep 3, 2024
Attributes for Blocks
Medium (6.4)
CVE-2024-6929
Unpatched
Sep 4, 2024
Dynamic Featured Image
Medium (6.4)
CVE-2024-7611
Unpatched
Sep 6, 2024
Enter Addons – Ultimate Template Builder for Elementor
Medium (6.4)
CVE-2024-8325
Patched
Sep 3, 2024
Medium (6.4)
CVE-2024-6849
Unpatched
Sep 6, 2024
Preloader Plus – WordPress Loading Screen Plugin
Medium (6.4)
CVE-2024-6894
Patched
Sep 4, 2024
RD Station
Medium (6.4)
CVE-2024-8363
Patched
Sep 4, 2024
Share This Image
Medium (6.4)
CVE-2024-8317
Patched
Sep 5, 2024
WP AdCenter – Ad Manager & Adsense Ads
Medium (6.1)
CVE-2024-8119
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
Medium (6.1)
CVE-2024-8117
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
Medium (5.4)
CVE-2024-5309
Patched
Sep 4, 2024
Form Vibes – Database Manager for Forms
Medium (5.4)
CVE-2024-8123
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
Medium (5.4)
CVE-2024-8121
Patched
Sep 3, 2024
The Ultimate WordPress Toolkit – WP Extended
Medium (5.3)
CVE-2024-6010
Unpatched
Sep 6, 2024
Cost Calculator Builder PRO
Medium (5.3)
CVE-2024-7381
Unpatched
Sep 4, 2024
Geo Controller
Medium (5.3)
CVE-2024-6835
Patched
Sep 4, 2024
Ivory Search – WordPress Search Plugin
Medium (5.3)
CVE-2024-7415
Patched
Sep 5, 2024
Remember Me Controls
Security, Antivirus, Firewall – S.A.F <= 2.3.5 – IP Address Spoofing to Protection Mechanism Bypass
Medium (5.3)
CVE-2022-4529
Unpatched
Sep 4, 2024
Security, Antivirus, Firewall – S.A.F
Medium (4.9)
CVE-2024-8031
Patched
Sep 3, 2024
Secure Downloads
Medium (4.4)
CVE-2022-3556
Unpatched
Sep 4, 2024
Cab fare calculator
Medium (4.3)
CVE-2024-8538
Patched
Sep 6, 2024
Big File Uploads – Increase Maximum File Upload Size
Medium (4.3)
CVE-2024-8427
Patched
Sep 5, 2024
Medium (4.3)
CVE-2024-7380
Unpatched
Sep 4, 2024
Geo Controller
HelloAsso <= 1.1.10 – Missing Authorization to Authenticated (Contributor+) Limited Options Update
Medium (4.3)
CVE-2024-7605
Patched
Sep 4, 2024
HelloAsso
Medium (4.3)
CVE-2024-7622
Patched
Sep 6, 2024
Revision Manager TMC
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024) appeared first on Wordfence.