Calling all Vulnerability Researchers and Bug Bounty Hunters!
Operation: Maximum Impact Challenge! Now through November 10, 2025, earn 2X bounty rewards for all in-scope submissions in software with at least 5,000 active installs and fewer than 5 million active installs. Bounties up to $31,200 per vulnerability. Submit bold. Earn big!
The LFInder Challenge: Refine your LFI hunting skills with an expanded scope. Now through November 24, 2025, all LFI vulnerabilities in software with at least 25 active installs are considered in-scope for all researchers, regardless of researcher tier, AND earn a 30% bonus on all Local File Inclusion vulnerability submissions not already increased by another promotion.
Last week, there were 55 vulnerabilities disclosed in 48 WordPress Plugins and 3 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 34 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to implement layered security, aligning with our overarching mission to secure WordPress with defense in depth strategies. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report. As the world’s leading quality vulnerability database provider for WordPress, site owners can rest assured knowing Wordfence has their back.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 29,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
- WAF-RULE-865 – Data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status | Number of Vulnerabilities |
---|---|
Patched | 42 |
Unpatched | 13 |
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating | Number of Vulnerabilities |
---|---|
Low Severity | 1 |
Medium Severity | 39 |
High Severity | 7 |
Critical Severity | 8 |
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE | Number of Vulnerabilities |
---|---|
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 12 |
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | 9 |
Cross-Site Request Forgery (CSRF) | 7 |
Exposure of Sensitive Information to an Unauthorized Actor | 4 |
Missing Authorization | 4 |
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) | 3 |
Authorization Bypass Through User-Controlled Key | 2 |
Authentication Bypass Using an Alternate Path or Channel | 1 |
External Control of File Name or Path | 1 |
Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’) | 1 |
Improper Neutralization of Formula Elements in a CSV File | 1 |
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | 1 |
Improper Privilege Management | 1 |
Incorrect Authorization | 1 |
Insertion of Sensitive Information into Log File | 1 |
Missing Authentication for Critical Function | 1 |
Protection Mechanism Failure | 1 |
Relative Path Traversal | 1 |
Server-Side Request Forgery (SSRF) | 1 |
Unrestricted Upload of File with Dangerous Type | 1 |
URL Redirection to Untrusted Site (‘Open Redirect’) | 1 |
Researchers That Contributed to WordPress Security Last Week
Researcher Name | Number of Vulnerabilities |
---|---|
5 | |
4 | |
3 | |
3 | |
3 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name | Software Slug |
---|---|
All In One Login — WP Admin Login Page Security and Customization with Google reCAPTCHA, Social Login, Limit Login Attempt, 2FA, and more. | change-wp-admin-login |
APPExperts – Mobile App Builder for WordPress | WooCommerce to iOS and Android Apps | appexperts |
Blocksy Companion | blocksy-companion |
Chartify – WordPress Chart Plugin | chart-builder |
CM Registration – Tailored tool for seamless login and invitation-based registrations | cm-invitation-codes |
Code Quality Control Tool | code-quality-control-tool |
Colibri Page Builder | colibri-page-builder |
Community Events | community-events |
Contest Gallery – Upload, Vote & Sell with PayPal and Stripe | contest-gallery |
Cookie Notice & Consent | cookie-notice-consent |
Course Redirects for Learndash Plugin | course-redirects-for-learndash |
Custom 404 Pro | custom-404-pro |
Draft List | simple-draft-list |
Easy Plugin Stats | easy-plugin-stats |
Enable Media Replace | enable-media-replace |
Error Log Viewer by BestWebSoft | error-log-viewer |
Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin | everest-backup |
Featured Image from URL (FIFU) | featured-image-from-url |
GSheetConnector For Gravity Forms | gsheetconnector-gravity-forms |
Lisfinity Core – Lisfinity Core plugin used for pebas® Lisfinity WordPress theme | lisfinity-core |
Motors – Car Dealership & Classified Listings Plugin | motors-car-dealership-classified-listings |
My auctions allegro | my-auctions-allegro-free-edition |
NEX-Forms – Ultimate Forms Plugin for WordPress | nex-forms-express-wp-form-builder |
Ovatheme Events Manager | ova-events-manager |
Page Blocks | page-blocks |
Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers | popup-builder-block |
Progress Planner | progress-planner |
RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login | custom-registration-form-builder-with-submission-manager |
Search & Filter | search-filter |
Slider Revolution | revslider |
Stock History & Reports Manager for WooCommerce | stock-snapshot-for-woocommerce |
Trinity Audio – Text to Speech AI audio player to convert content into audio | trinity-audio |
Ultimate Addons for WPBakery | Ultimate_VC_Addons |
Web Accessibility by accessiBe | accessibe |
Welcart e-Commerce | usc-e-shop |
WidgetPack Comment System | widgetpack-comment-system |
WooCommerce Designer Pro | wc-designer-pro |
WordPress Live Webcam Widget & Shortcode | wp-webcam-widget-shortcode |
WP Easy Toggles | wp-easy-toggles |
WP Freeio | wp-freeio |
WP Gmail SMTP | wp-gmail-smtp |
WP Go Maps (formerly WP Google Maps) | wp-google-maps |
WP JobHunt | wp-jobhunt |
WP Links Page | wp-links-page |
WP Reset | wp-reset |
WP Scraper | wp-scraper |
WP Travel Engine – Tour Booking Plugin – Tour Operator Software | wp-travel-engine |
WPC Smart Wishlist for WooCommerce | woo-smart-wishlist |
WordPress Themes with Reported Vulnerabilities Last Week
Software Name | Software Slug |
---|---|
Betheme | betheme |
Newsup | newsup |
Search & Go – Directory WordPress Theme | search-and-go |
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (October 6, 2025 to October 12, 2025) appeared first on Wordfence.