Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024)


📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.


Last week, there were 54 vulnerabilities disclosed in 48 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 32 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Patched 46
Unpatched 8


Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Medium Severity 40
High Severity 10
Critical Severity 4


Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 19
Missing Authorization 13
Exposure of Sensitive Information to an Unauthorized Actor 5
Authorization Bypass Through User-Controlled Key 3
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 3
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 2
Improper Privilege Management 2
Cross-Site Request Forgery (CSRF) 1
External Control of Assumed-Immutable Web Parameter 1
Improper Authentication 1
Improper Control of Generation of Code ('Code Injection') 1
Insertion of Sensitive Information into Log File 1
Unrestricted Upload of File with Dangerous Type 1
Use of Less Trusted Source 1


Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
7
7
4
3
3
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
adstxt Plugin adstxt
Advanced Custom Fields UNKNOWN-CVE-2023-40068-1
Advanced Custom Fields Pro advanced-custom-fields-pro
Advanced Sermons advanced-sermons
AI ChatBot with ChatGPT and Content Generator by AYS ays-chatgpt-assistant
Attributes for Blocks attributes-for-blocks
Big File Uploads – Increase Maximum File Upload Size tuxedo-big-file-uploads
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress file-manager
Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed blockspare
Booking for Appointments and Events Calendar – Amelia ameliabooking
Booking for Appointments and Events Calendar – Amelia Premium ameliabooking
Cab fare calculator cab-fare-calculator
Chatbot with ChatGPT WordPress smartsearchwp
Contact Form 7 Math Captcha ds-cf7-math-captcha
Content Blocks (Custom Post Widget) custom-post-widget
Cost Calculator Builder PRO cost-calculator-builder-pro
Customizer Export/Import customizer-export-import
Dynamic Featured Image dynamic-featured-image
Enter Addons – Ultimate Template Builder for Elementor enteraddons
Form Vibes – Database Manager for Forms form-vibes
ForumWP – Forum & Discussion Board forumwp
Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin frontend-post-submission-manager-lite
Geo Controller cf-geoplugin
HelloAsso helloasso
Ivory Search – WordPress Search Plugin add-search-to-menu
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes lifterlms
LiteSpeed Cache litespeed-cache
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution dc-woocommerce-multi-vendor
Newsletters newsletters-lite
Ninja Forms - File Uploads ninja-forms-uploads
Pinpoint Booking System – #1 WordPress Booking Plugin booking-system
PixelYourSite Pro – Your smart PIXEL (TAG) Manager pixelyoursite-pro
PixelYourSite – Your smart PIXEL (TAG) & API Manager pixelyoursite
Preloader Plus – WordPress Loading Screen Plugin preloader-plus
Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker quiz-master-next
RD Station integracao-rd-station
Remember Me Controls remember-me-controls
Revision Manager TMC revision-manager-tmc
Secure Downloads secure-downloads
Security, Antivirus, Firewall – S.A.F security-antivirus-firewall
Share This Image share-this-image
The Ultimate WordPress Toolkit – WP Extended wpextended
WP AdCenter – Ad Manager & Adsense Ads wpadcenter
WP Job Portal – A Complete Recruitment System for Company or Job Board website wp-job-portal
WP ULike – The Ultimate Engagement Toolkit for Websites wp-ulike
WP-Recall – Registration, Profile, Commerce & More wp-recall
WPCOM Member wpcom-member
YITH WooCommerce Ajax Search yith-woocommerce-ajax-search


Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-7493
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
WPCOM Member
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8247
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Newsletters
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-7112
Patch Status
Patched
Published
Sep 6, 2024
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-44000
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
LiteSpeed Cache
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-7349
Patch Status
Patched
Published
Sep 5, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-1596
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Ninja Forms - File Uploads
Researcher
CVSS Rating
Medium (6.6)
CVE-ID
CVE-2024-7620
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Customizer Export/Import
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-7599
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Advanced Sermons
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8318
Patch Status
Patched
Published
Sep 3, 2024
Affected Software
Attributes for Blocks
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-44051
Patch Status
Patched
Published
Sep 5, 2024
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6929
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Dynamic Featured Image
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6894
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
RD Station
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8363
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
Share This Image
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-7846
Patch Status
Patched
Published
Sep 2, 2024
Affected Software
YITH WooCommerce Ajax Search
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-6517
Patch Status
Unpatched
Published
Sep 5, 2024
Affected Software
Contact Form 7 Math Captcha
Researchers
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8119
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.8)
CVE-ID
CVE-2024-6845
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
Chatbot with ChatGPT WordPress
Researcher
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-45429
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-5309
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8123
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8121
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7714
Patch Status
Patched
Published
Sep 5, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7713
Patch Status
Patched
Published
Sep 5, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6010
Patch Status
Unpatched
Published
Sep 6, 2024
Affected Software
Cost Calculator Builder PRO
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7381
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
Geo Controller
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6835
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7415
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Remember Me Controls
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2022-4529
Patch Status
Unpatched
Published
Sep 4, 2024
CVSS Rating
Medium (4.9)
CVE-ID
CVE-2024-8031
Patch Status
Patched
Published
Sep 3, 2024
Affected Software
Secure Downloads
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2022-3556
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Cab fare calculator
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-8758
Patch Status
Patched
Published
Sep 2, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-7878
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7892
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
adstxt Plugin
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-8538
Patch Status
Patched
Published
Sep 6, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7380
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
Geo Controller
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7605
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
HelloAsso
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7622
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Revision Manager TMC
Researcher


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

Did you enjoy this post? Share it!

Comments

No Comments