Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024)

Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.

Last week, there were 45 vulnerabilities disclosed in 40 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 25 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our PremiumCare, and Response customers last week:

ForumWP – Forum & Discussion Board Plugin <= 2.0.2 – Insecure Direct Object Reference to Authenticated (Subscriber+) Privilege Escalation via Account Takeover
WP-Recall – Registration, Profile, Commerce & More <= 16.26.8 – Insecure Direct Object Reference to Unauthenticated Arbitrary Password Update
The Ultimate WordPress Toolkit – WP Extended <= 3.0.8 – Authenticated (Subscriber+) Sensitive Information Exposure and Arbitrary Options Update
WAF-RULE-738 – Data redacted while we work with the vendor on a patch.
WAF-RULE-734 – Data redacted while we work with the vendor on a patch.

Wordfence PremiumCare, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.

Total Unpatched & Patched Vulnerabilities Last Week

Patch Status
Number of Vulnerabilities

Patched
35

Unpatched
10

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating
Number of Vulnerabilities

Medium Severity
31

High Severity
10

Critical Severity
4

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE
Number of Vulnerabilities

Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
14

Missing Authorization
11

Exposure of Sensitive Information to an Unauthorized Actor
4

Authorization Bypass Through User-Controlled Key
3

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
3

Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
2

Improper Privilege Management
2

External Control of Assumed-Immutable Web Parameter
1

Improper Authentication
1

Improper Control of Generation of Code (‘Code Injection’)
1

Insertion of Sensitive Information into Log File
1

Unrestricted Upload of File with Dangerous Type
1

Use of Less Trusted Source
1

Researchers That Contributed to WordPress Security Last Week

Researcher Name
Number of Vulnerabilities

7

7

4

3

2

2

2

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.

WordPress Plugins with Reported Vulnerabilities Last Week

Software Name
Software Slug

Advanced Custom Fields

UNKNOWN-CVE-2023-40068-1

Advanced Custom Fields Pro

advanced-custom-fields-pro

Advanced Sermons

advanced-sermons

Attributes for Blocks

attributes-for-blocks

Big File Uploads – Increase Maximum File Upload Size

tuxedo-big-file-uploads

Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress

file-manager

Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed

blockspare

Booking for Appointments and Events Calendar – Amelia

ameliabooking

Booking for Appointments and Events Calendar – Amelia Premium

ameliabooking

Cab fare calculator

cab-fare-calculator

Cost Calculator Builder PRO

cost-calculator-builder-pro

Customizer Export/Import

customizer-export-import

Dynamic Featured Image

dynamic-featured-image

Enter Addons – Ultimate Template Builder for Elementor

enteraddons

Form Vibes – Database Manager for Forms

form-vibes

ForumWP – Forum & Discussion Board Plugin

forumwp

Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin

frontend-post-submission-manager-lite

Geo Controller

cf-geoplugin

HelloAsso

helloasso

Ivory Search – WordPress Search Plugin

add-search-to-menu

LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes

lifterlms

LiteSpeed Cache

litespeed-cache

MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution

dc-woocommerce-multi-vendor

Newsletters

newsletters-lite

Ninja Forms – File Uploads

ninja-forms-uploads

Pinpoint Booking System – WordPress Booking Plugin

booking-system

PixelYourSite Pro – Your smart PIXEL (TAG) Manager

pixelyoursite-pro

PixelYourSite – Your smart PIXEL (TAG) & API Manager

pixelyoursite

Preloader Plus – WordPress Loading Screen Plugin

preloader-plus

RD Station

integracao-rd-station

Remember Me Controls

remember-me-controls

Revision Manager TMC

revision-manager-tmc

Secure Downloads

secure-downloads

Security, Antivirus, Firewall – S.A.F

security-antivirus-firewall

Share This Image

share-this-image

The Ultimate WordPress Toolkit – WP Extended

wpextended

WP AdCenter – Ad Manager & Adsense Ads

wpadcenter

WP Job Portal – A Complete Recruitment System for Company or Job Board website

wp-job-portal

WP-Recall – Registration, Profile, Commerce & More

wp-recall

WPCOM Member

wpcom-member

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-7493
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
WPCOM Member
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8247
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Newsletters
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-7112
Patch Status
Patched
Published
Sep 6, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8102
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-44000
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
LiteSpeed Cache
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-7349
Patch Status
Patched
Published
Sep 5, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-1596
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Ninja Forms – File Uploads
Researcher
CVSS Rating
Medium (6.6)
CVE-ID
CVE-2024-7620
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Customizer Export/Import
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-7599
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Advanced Sermons
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8318
Patch Status
Patched
Published
Sep 3, 2024
Affected Software
Attributes for Blocks
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6929
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Dynamic Featured Image
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6894
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
RD Station
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8363
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
Share This Image
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8119
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8117
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-45429
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-5309
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8123
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-8121
Patch Status
Patched
Published
Sep 3, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6010
Patch Status
Unpatched
Published
Sep 6, 2024
Affected Software
Cost Calculator Builder PRO
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7381
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Geo Controller
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6835
Patch Status
Patched
Published
Sep 4, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-7415
Patch Status
Patched
Published
Sep 5, 2024
Affected Software
Remember Me Controls
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2022-4529
Patch Status
Unpatched
Published
Sep 4, 2024
Researcher
CVSS Rating
Medium (4.9)
CVE-ID
CVE-2024-8031
Patch Status
Patched
Published
Sep 3, 2024
Affected Software
Secure Downloads
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2022-3556
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Cab fare calculator
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-8538
Patch Status
Patched
Published
Sep 6, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7380
Patch Status
Unpatched
Published
Sep 4, 2024
Affected Software
Geo Controller
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7605
Patch Status
Patched
Published
Sep 4, 2024
Affected Software
HelloAsso
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-7622
Patch Status
Patched
Published
Sep 6, 2024
Affected Software
Revision Manager TMC
Researcher

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024) appeared first on Wordfence.

Leave a Comment