Wordfence Intelligence Weekly WordPress Vulnerability Report (September 9, 2024 to September 15, 2024)

Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.

Last week, there were 65 vulnerabilities disclosed in 51 WordPress Plugins and 7 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 29 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our PremiumCare, and Response customers last week:

WAF-RULE-740 – Data redacted while we work with the vendor on a patch.
WAF-RULE-739 – Data redacted while we work with the vendor on a patch.

Wordfence PremiumCare, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.

Total Unpatched & Patched Vulnerabilities Last Week

Patch Status
Number of Vulnerabilities

Patched
52

Unpatched
13

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating
Number of Vulnerabilities

Medium Severity
47

High Severity
13

Critical Severity
5

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE
Number of Vulnerabilities

Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
38

Missing Authorization
5

Improper Control of Generation of Code (‘Code Injection’)
4

Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
4

Cross-Site Request Forgery (CSRF)
2

Exposure of Sensitive Information to an Unauthorized Actor
2

Improper Privilege Management
2

Unrestricted Upload of File with Dangerous Type
2

Authentication Bypass Using an Alternate Path or Channel
1

Authorization Bypass Through User-Controlled Key
1

Deserialization of Untrusted Data
1

External Control of File Name or Path
1

Improper Access Control
1

Incorrect Privilege Assignment
1

Researchers That Contributed to WordPress Security Last Week

Researcher Name
Number of Vulnerabilities

13

8

6

4

3

2

2

2

Ram

2

2

2

2

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.

WordPress Plugins with Reported Vulnerabilities Last Week

Software Name
Software Slug

Advanced WordPress Backgrounds

advanced-backgrounds

Affiliate Super Assistent

amazonsimpleadmin

amCharts: Charts and Maps

amcharts-charts-and-maps

Backuply – Backup, Restore, Migrate and Clone

backuply

Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress

file-manager

Classified Listing – Classified ads & Business Directory Plugin

classified-listing

Community by PeepSo – Social Network, Membership, Registration, User Profiles, Premium – Mobile App

peepso-core

Cron Jobs

leira-cron-jobs

Custom Post Limits

custom-post-limits

Elementor Website Builder – More than Just a Page Builder

elementor

Email Obfuscate Shortcode

email-obfuscate-shortcode

Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders

essential-addons-for-elementor-lite

EventPrime – Events Calendar, Bookings and Tickets

eventprime-event-calendar-management

Exit Notifier

exit-notifier

Flipping Cards

flipping-cards

Forminator Forms – Contact Form, Payment Form & Custom Form Builder

forminator

FOX – Currency Switcher Professional for WooCommerce

woocommerce-currency-switcher

Frontend Dashboard

frontend-dashboard

Fusion Builder

fusion-builder

HTML5 Video Player – mp4 Video Player Plugin and Block

html5-video-player

LearnPress – WordPress LMS Plugin

learnpress

Login with phone number

login-with-phone-number

Lucas String Replace

lucas-string-replace

Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor

master-addons

Migration, Backup, Staging – WPvivid

wpvivid-backuprestore

MStore API – Create Native Android & iOS Apps On The Cloud

mstore-api

Nova Blocks by Pixelgrade

nova-blocks

PDF Thumbnail Generator

pdf-thumbnail-generator

Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC)

buddyforms

Post Grid and Gutenberg Blocks

post-grid

Product Slider for WooCommerce by PickPlugins

woocommerce-products-slider

Roles & Capabilities

leira-roles

Simple Spoiler

simple-spoiler

Slider comparison image before and after

slider-comparison-image-before-and-after

Spiffy Calendar

spiffy-calendar

Stream

stream

Tag Groups is the Advanced Way to Display Your Taxonomy Terms

tag-groups

Tutor LMS – eLearning and online course solution

tutor

video carousel slider with lightbox

wp-responsive-video-gallery-with-lightbox

Waitlist Woocommerce ( Back in stock notifier )

waitlist-woocommerce

WooCommerce Multiple Free Gift

woocommerce-multiple-free-gift

WooCommerce Photo Reviews Premium

woocommerce-photo-reviews

WordPress Affiliates Plugin — SliceWP Affiliates

slicewp

WP Booking System – Booking Calendar

wp-booking-system

WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)

delicious-recipes

WP Editor

wp-editor

WP Meta SEO

wp-meta-seo

WP Simple Booking Calendar

wp-simple-booking-calendar

WP Test Email

wp-test-email

WPFactory Helper

wpcodefactory-helper

YITH Custom Login

yith-custom-login

WordPress Themes with Reported Vulnerabilities Last Week

Software Name
Software Slug

Beauty

beauty

Betheme

betheme

Bricks

bricks

Delicate

delicate

Neighborly

neighborly

Triton Lite

triton-lite

Tweaker5

tweaker5

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-8529
Patch Status
Patched
Published
Sep 11, 2024
Researcher
CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-8522
Patch Status
Patched
Published
Sep 11, 2024
Researcher
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-8277
Patch Status
Patched
Published
Sep 10, 2024
Researcher
CVSS Rating
Critical (9.1)
CVE-ID
CVE-2024-8669
Patch Status
Patched
Published
Sep 13, 2024
CVSS Rating
Critical (9.1)
CVE-ID
CVE-2019-25212
Patch Status
Patched
Published
Sep 10, 2024
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8268
Patch Status
Patched
Published
Sep 9, 2024
Affected Software
Frontend Dashboard
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6482
Patch Status
Patched
Published
Sep 14, 2024
Affected Software
Login with phone number
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8253
Patch Status
Patched
Published
Sep 10, 2024
Affected Software
Post Grid and Gutenberg Blocks
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-7423
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Stream
Researcher
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-7315
Patch Status
Patched
Published
Sep 11, 2024
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-8478
Patch Status
Patched
Published
Sep 9, 2024
Affected Software
Affiliate Super Assistent
Researcher
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-8479
Patch Status
Patched
Published
Sep 13, 2024
Affected Software
Simple Spoiler
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2022-2446
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WP Editor
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8045
Patch Status
Patched
Published
Sep 10, 2024
Affected Software
Advanced WordPress Backgrounds
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5628
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Fusion Builder
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5884
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Beauty
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5567
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Betheme
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5867
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Delicate
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8747
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Email Obfuscate Shortcode
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5869
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Neighborly
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8241
Patch Status
Patched
Published
Sep 9, 2024
Affected Software
Nova Blocks by Pixelgrade
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8543
Patch Status
Unpatched
Published
Sep 9, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-45457
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Spiffy Calendar
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5789
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Triton Lite
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5870
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Tweaker5
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-45456
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WP Meta SEO
Researcher
CVSS Rating
Medium (6.3)
CVE-ID
CVE-2024-7888
Patch Status
Patched
Published
Sep 12, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8622
Patch Status
Patched
Published
Sep 11, 2024
Affected Software
amCharts: Charts and Maps
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8731
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Cron Jobs
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8730
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Exit Notifier
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8734
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Lucas String Replace
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8737
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
PDF Thumbnail Generator
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-45459
Patch Status
Patched
Published
Sep 12, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8732
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Roles & Capabilities
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-45458
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Spiffy Calendar
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8724
Patch Status
Patched
Published
Sep 13, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8714
Patch Status
Patched
Published
Sep 12, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8797
Patch Status
Patched
Published
Sep 13, 2024
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8663
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WP Simple Booking Calendar
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8664
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WP Test Email
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8656
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WPFactory Helper
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8665
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
YITH Custom Login
Researcher
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2023-3410
Patch Status
Patched
Published
Sep 13, 2024
Affected Software
Bricks
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6544
Patch Status
Unpatched
Published
Sep 12, 2024
Affected Software
Custom Post Limits
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2022-3459
Patch Status
Unpatched
Published
Sep 13, 2024
Affected Software
WooCommerce Multiple Free Gift
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-43237
Patch Status
Patched
Published
Sep 12, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-45460
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
Flipping Cards
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-45455
Patch Status
Patched
Published
Sep 12, 2024
Affected Software
WP Meta SEO
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2023-2919
Patch Status
Patched
Published
Sep 9, 2024

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 9, 2024 to September 15, 2024) appeared first on Wordfence.

Leave a Comment