Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.
Last week, there were 45 vulnerabilities disclosed in 40 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 25 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
ForumWP – Forum & Discussion Board Plugin <= 2.0.2 – Insecure Direct Object Reference to Authenticated (Subscriber+) Privilege Escalation via Account Takeover
WP-Recall – Registration, Profile, Commerce & More <= 16.26.8 – Insecure Direct Object Reference to Unauthenticated Arbitrary Password Update
The Ultimate WordPress Toolkit – WP Extended <= 3.0.8 – Authenticated (Subscriber+) Sensitive Information Exposure and Arbitrary Options Update
WAF-RULE-738 – Data redacted while we work with the vendor on a patch.
WAF-RULE-734 – Data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Patched
35
Unpatched
10
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Medium Severity
31
High Severity
10
Critical Severity
4
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
14
Missing Authorization
11
Exposure of Sensitive Information to an Unauthorized Actor
4
Authorization Bypass Through User-Controlled Key
3
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
3
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
2
Improper Privilege Management
2
External Control of Assumed-Immutable Web Parameter
1
Improper Authentication
1
Improper Control of Generation of Code (‘Code Injection’)
1
Insertion of Sensitive Information into Log File
1
Unrestricted Upload of File with Dangerous Type
1
Use of Less Trusted Source
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
7
7
4
3
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
Advanced Custom Fields
Advanced Custom Fields Pro
Advanced Sermons
Attributes for Blocks
Big File Uploads – Increase Maximum File Upload Size
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress
Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Business Sites – Post Grids, Sliders, Carousels, Counters, Page Builder & Starter Site Imports, No Coding Needed
Booking for Appointments and Events Calendar – Amelia
Booking for Appointments and Events Calendar – Amelia Premium
Cab fare calculator
Cost Calculator Builder PRO
Customizer Export/Import
Dynamic Featured Image
Enter Addons – Ultimate Template Builder for Elementor
Form Vibes – Database Manager for Forms
ForumWP – Forum & Discussion Board Plugin
Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
frontend-post-submission-manager-lite
Geo Controller
HelloAsso
Ivory Search – WordPress Search Plugin
LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes
LiteSpeed Cache
MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution
Newsletters
Ninja Forms – File Uploads
Pinpoint Booking System – #1 WordPress Booking Plugin
PixelYourSite Pro – Your smart PIXEL (TAG) Manager
PixelYourSite – Your smart PIXEL (TAG) & API Manager
Preloader Plus – WordPress Loading Screen Plugin
RD Station
Remember Me Controls
Revision Manager TMC
Secure Downloads
Security, Antivirus, Firewall – S.A.F
Share This Image
The Ultimate WordPress Toolkit – WP Extended
WP AdCenter – Ad Manager & Adsense Ads
WP Job Portal – A Complete Recruitment System for Company or Job Board website
WP-Recall – Registration, Profile, Commerce & More
WPCOM Member
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024) appeared first on Wordfence.