Last week, there were 84 vulnerabilities disclosed in 76 WordPress Plugins and 2 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 42 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
tagDiv Cloud Library < 2.7 – Missing Authorization to Arbitrary User Metadata Update
WAF-RULE-610 – Information redacted while we work with developer to ensure this vulnerability gets patched.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Unpatched
20
Patched
64
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Low Severity
0
Medium Severity
69
High Severity
9
Critical Severity
6
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
35
Missing Authorization
14
Cross-Site Request Forgery (CSRF)
11
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
9
Authorization Bypass Through User-Controlled Key
5
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
1
Improperly Controlled Modification of Object Prototype Attributes (‘Prototype Pollution’)
1
Improper Neutralization of Formula Elements in a CSV File
1
URL Redirection to Untrusted Site (‘Open Redirect’)
1
Improper Control of Generation of Code (‘Code Injection’)
1
Incorrect Privilege Assignment
1
Information Exposure
1
Insufficient Verification of Data Authenticity
1
Authentication Bypass Using an Alternate Path or Channel
1
External Control of File Name or Path
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
Marco Wotschka
(Wordfence Vulnerability Researcher)
7
Lana Codes
(Wordfence Vulnerability Researcher)
3
Alex Thomas
(Wordfence Vulnerability Researcher)
2
Erwan LR
2
drwtsn
1
An Đặng
1
Skalucy
1
Lucio Sá
1
Mika
1
yuyudhn
1
qerogram
1
qilin_99
1
BOT
1
FearZzZz
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
AN_GradeBook
an-gradebook
About Me 3000 widget
about-me-3000
All In One Redirection
all-in-one-redirection
BBS e-Popup
bbs-e-popup
Booking Calendar Contact Form
booking-calendar-contact-form
Booking Calendar | Appointment Booking | BookIt
bookit
Buy Me a Coffee – Button and Widget Plugin
buymeacoffee
CMS Commander – Manage Multiple Sites
cms-commander-client
Colibri Page Builder
colibri-page-builder
Companion Sitemap Generator – HTML & XML
companion-sitemap-generator
Complianz Premium – GDPR/CCPA Cookie Consent
complianz-gdpr-premium
Complianz – GDPR/CCPA Cookie Consent
complianz-gdpr
Contact Form by WPForms – Drag & Drop Form Builder for WordPress
wpforms-lite
Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress
contact-form-to-db
Core Web Vitals & PageSpeed Booster
core-web-vitals-pagespeed-booster
Customer Service Software & Support Ticket System
wp-ticket
Display Custom Fields – wpView
wpview
Elementor Website Builder Pro
elementor-pro
Enable SVG Uploads
enable-svg-uploads
Enable SVG, WebP & ICO Upload
enable-svg-webp-ico-upload
EventON
eventon-lite
Export All URLs
export-all-urls
Extra User Details
extra-user-details
Five Star Restaurant Reservations – WordPress Booking Plugin
restaurant-reservations
Float menu – awesome floating side menu
float-menu
Form Builder | Create Responsive Contact Forms
contact-form-add
Gallery Metabox
gallery-metabox
Gravity Forms
gravityforms
Greeklish-permalink
greeklish-permalink
Gutenverse – Gutenberg Blocks – Page Builder for Site Editor
gutenverse
HTTP Headers
http-headers
Image Protector
image-protector
InventoryPress
inventorypress
JS Help Desk – Best Help Desk & Support Plugin
js-support-ticket
Lana Shortcodes
lana-shortcodes
Lana Text to Image
lana-text-to-image
MStore API
mstore-api
Mail Queue
mail-queue
Mailtree Log Mail
mailtree-log-mail
MainWP Child – Securely Connects Sites to the MainWP WordPress Manager Dashboard
mainwp-child
Membership Plugin – Restrict Content
restrict-content
Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
metform
MojoPlug Slide Panel
mojoplug-slide-panel
MyCurator Content Curation
mycurator
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress
ninja-forms
OOPSpam Anti-Spam
oopspam-anti-spam
Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
wp-user-avatar
Popup by Supsystic
popup-by-supsystic
PostX – Gutenberg Post Grid Blocks
ultimate-post
Potent Donations for WooCommerce
donations-for-woocommerce
PrePost SEO
prepost-seo
Product Vendors
woocommerce-product-vendors
Quick Post Duplicator
rduplicator
ReDi Restaurant Reservation
redi-restaurant-reservation
Sermon’e – Sermons Online
sermone-online-sermons-management
Simple Iframe
simple-iframe
Smoothscroller
smoothscroller
Social Share, Social Login and Social Comments Plugin – Super Socializer
super-socializer
Spam protection, AntiSpam, FireWall by CleanTalk
cleantalk-spam-protect
Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
unlimited-elements-for-elementor
WP Cookie Notice for GDPR, CCPA & ePrivacy Consent
gdpr-cookie-consent
WP Mail Logging
wp-mail-logging
WP Sticky Social
wp-sticky-social
WP-Members Membership Plugin
wp-members
WPBakery Page Builder for WordPress
js_composer
WPForms Pro
wpforms
WooCommerce Brands
woocommerce-brands
WooCommerce Bulk Stock Management
woocommerce-bulk-stock-management
WooCommerce PayPal Payments
woocommerce-paypal-payments
WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo
woocommerce-payments
WooCommerce Square
woocommerce-square
WooCommerce Subscription
woocommerce-subscriptions
WordPress Button Plugin MaxButtons
maxbuttons
google-analytics-premium
google-analytics-premium
tagDiv Cloud Library
td-cloud-library
teachPress
teachpress
WordPress Themes with Reported Vulnerabilities Last Week
Software Name
Software Slug
Balkon
balkon
Newspaper – News & WooCommerce WordPress Theme
newspaper
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
tagDiv Cloud Library < 2.7 – Missing Authorization to Arbitrary User Metadata Update
CVE ID: CVE-2023-1597
CVSS Score: 9.8 (Critical)
Researcher/s: Truoc Phan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/24e8d1a4-9853-4f60-a371-7fdbe86d554b
MStore API <= 4.0.1 – Unauthenticated SQL Injection
CVE ID: CVE-2023-3197
CVSS Score: 9.8 (Critical)
Researcher/s: Truoc Phan, An Đặng
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/30aab1af-a78f-4bac-b3c5-30ea854ccef7
MStore API <= 3.9.7 – Unauthenticated SQL Injection
CVE ID: CVE-2022-47614
CVSS Score: 9.8 (Critical)
Researcher/s: Lucio Sá
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/494c780d-5441-407d-8947-e56d7cac32d6
MStore API <= 3.9.8 – Unauthenticated Privilege Escalation
CVE ID: CVE-2023-3076
CVSS Score: 9.8 (Critical)
Researcher/s: Truoc Phan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/7d1cc8c4-6c14-4d0c-9420-02d709f88b2f
BookIt <= 2.3.7 – Authentication Bypass
CVE ID: CVE-2023-2834
CVSS Score: 9.8 (Critical)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cfd32e46-a4fc-4c10-b546-9f9da75db791
MStore API <= 3.9.7 – Unauthenticated SQL Injection
CVE ID: CVE-2023-3077
CVSS Score: 9.8 (Critical)
Researcher/s: Truoc Phan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/da36ba83-490e-4c9d-8a34-c5c79392a09a
Quick Post Duplicator <= 2.0 – Authenticated (Contributor+) SQL Injection via post_id
CVE ID: CVE-2023-2229
CVSS Score: 8.8 (High)
Researcher/s: Marco Wotschka
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/34e31a0f-27de-4536-9a7e-b8f68e557b3f
CMS Commander <= 2.287 – Authorization Bypass through Use of Insufficiently Unique Cryptographic Signature
CVE ID: CVE-2023-3325
CVSS Score: 8.1 (High)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1
EventON <= 2.1 – Insecure Direct Object Reference to Unauthorized Post Access
CVE ID: CVE-2023-3219
CVSS Score: 7.5 (High)
Researcher/s: Miguel Santareno
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1485dda6-bf83-4076-80c9-dc7ea9d58155
Mailtree Log Mail <= 1.0.0 – Unauthenticated Stored Cross-Site Scripting via Email Subject
CVE ID: CVE-2023-3135
CVSS Score: 7.2 (High)
Researcher/s: Alex Thomas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e
Contact Form to DB by BestWebSoft <= 1.7.1 – Authenticated (Administrator+) SQL Injection via ‘s’
CVE ID: CVE-2023-36508
CVSS Score: 7.2 (High)
Researcher/s: LEE SE HYOUNG
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b0e582e3-9ca3-4601-81f2-cb6ef827a468
Colibri Page Builder <= 1.0.227 – Authenticated (Administrator+) SQL Injection via post_id
CVE ID: CVE-2023-2188
CVSS Score: 7.2 (High)
Researcher/s: Marco Wotschka
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c73d4b78-72aa-409a-a787-898179773b82
PostX – Gutenberg Blocks for Post Grid <= 2.9.9 – Unauthenticated Cross-Site Scripting
CVE ID: CVE-2023-36385
CVSS Score: 7.2 (High)
Researcher/s: Le Ngoc Anh
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d0c9f4c5-a4f6-4cab-8531-5b88b3f347ea
Mail Queue <= 1.1 – Unauthenticated Stored Cross-Site Scripting via Email Subject
CVE ID: CVE-2023-3167
CVSS Score: 7.2 (High)
Researcher/s: Alex Thomas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324
Popup by Supsystic <= 1.10.18 – Prototype Pollution
CVE ID: CVE-2023-3186
CVSS Score: 7.1 (High)
Researcher/s: drwtsn
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/12acf651-6476-491b-84b3-afbc6c655b17
WooCommerce Product Vendors <= 2.1.78 – Authenticated (Shop manager+) SQL Injection
CVE ID: CVE-2023-35879
CVSS Score: 6.6 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1388873f-8053-4ba9-8707-093bc0e8f2f5
All In One Redirection <= 2.1.0 – Authenticated(Administrator+) SQL Injection
CVE ID: CVE-2023-2493
CVSS Score: 6.6 (Medium)
Researcher/s: Chien Vuong
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/360a022d-8530-48af-be34-77d6b4b5c19d
HTTP Headers <= 1.18.10 – Authenticated(Administrator+) Remote Code Execution
CVE ID: CVE-2023-1208
CVSS Score: 6.6 (Medium)
Researcher/s: qerogram
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/75b84eae-6ff2-49af-a420-2aeef50224e3
WooCommerce Payments <= 5.9.0 – Authenticated (Shop manager+) SQL Injection via currency parameters
CVE ID: CVE-2023-35915
CVSS Score: 6.6 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e1f0ec5c-6853-4df9-816a-1790f3dc86e0
WooCommerce Payments <= 5.9.0 – Missing Authorization via redirect_pay_for_order_to_update_payment_method
CVE ID: CVE-2023-35916
CVSS Score: 6.5 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1811827d-88ae-45e0-a41e-d15fd0adf44a
Form Builder <= 1.9.9.0 – Cross-Site Request Forgery
CVE ID: CVE-2023-23795
CVSS Score: 6.5 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1f8a69ba-2663-4c54-8aef-4c5b0f851186
WooCommerce Subscriptions <= 5.1.2 – missing authorization to insecure direct object reference
CVE ID: CVE-2023-35914
CVSS Score: 6.5 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a45a6b3d-49e1-4e25-aa66-15b396da8986
Ninja Forms <= 3.6.24 – Authenticated (Admin+) Arbitrary File Deletion
CVE ID: CVE-2023-36505
CVSS Score: 6.5 (Medium)
Researcher/s: Theodoros Malachias
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e97479b1-06a0-4e24-9d2b-005bdfec9eaf
Sermon’e <= 1.0.0 – Authenticated(Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-35776
CVSS Score: 6.4 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0e1bfb29-80e7-4122-ab61-ef7c1dd8ebaa
Lana Shortcodes <= 1.1.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-3372
CVSS Score: 6.4 (Medium)
Researcher/s: Webbernaut
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/36806418-ae4e-4981-b9c5-dadb5e92e69a
Super Socializer <= 7.13.52 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-35882
CVSS Score: 6.4 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/558679ea-a8ee-4329-8ad7-34b708476b53
Enable SVG Uploads <= 2.1.5 – Authenticated (Author+) Stored Cross-Site Scripting via SVG
CVE ID: CVE-2023-2529
CVSS Score: 6.4 (Medium)
Researcher/s: Mateus Machado Tesser
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/58354ce0-e166-431a-9fac-6c6d81e39e88
WP Cookie Notice for GDPR, CCPA & ePrivacy Consent <= 2.2.5 – Authenticated(Administrator+) CSV Injection
CVE ID: CVE-2023-23678
CVSS Score: 6.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5d178852-53bc-440b-8217-67ae68749349
MonsterInsights Pro <= 8.14.1 – Authenticated (Contributor+) Stored Cross-Site Scripting
CVE ID: CVE-2023-32291
CVSS Score: 6.4 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/72c5d1b1-00bf-4352-b885-a8a7875c2bc6
WPBakery Page Builder for WordPress <= 6.12.0 – Authenticated (Contributor+) Stored Cross-Site Scripting
CVE ID: CVE-2023-31213
CVSS Score: 6.4 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/78579ed9-1540-44be-9884-51fc2afec2bd
Simple Iframe <= 1.1.1 – Authenticated(Contributor+) Stored Cross-Site Scripting via block attributes
CVE ID: CVE-2023-2964
CVSS Score: 6.4 (Medium)
Researcher/s: Jihoon Lee
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/810faad2-b63d-497c-af00-b57a07705608
InventoryPress <= 1.7 – Authenticated(Author+) Stored Cross-Site Scripting
CVE ID: CVE-2023-2579
CVSS Score: 6.4 (Medium)
Researcher/s: daniloalbuqrque
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/83603d33-b616-4332-aa05-b8ac61424614
Lana Text to Image <= 1.0.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-3387
CVSS Score: 6.4 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/8acb7893-85b2-404a-b3fe-b4c1a835b3eb
MaxButtons <= 9.5.3 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-36503
CVSS Score: 6.4 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/af478e73-a2b8-468a-9075-9c1db1a97d7c
Elementor Pro <= 3.13.0 – Missing Authorization
CVE ID: CVE-2023-35050
CVSS Score: 6.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0cba362e-c1e3-4840-941f-b8af8469f771
JS Help Desk – Best Help Desk & Support Plugin <= 2.7.7 – Missing Authorization via ajaxhandler to Insecure Direct Object Reference
CVE ID: CVE-2023-23679
CVSS Score: 6.3 (Medium)
Researcher/s: Fariq Fadillah Gusti Insani
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/594004eb-d32c-4b96-9afd-ae6470d9ddcc
Spam protection, AntiSpam, FireWall by CleanTalk <= 6.10 – Missing Authorization
CVE ID: CVE-2023-33996
CVSS Score: 6.3 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/89dab433-91e9-4500-ab40-f4b500e66983
Unlimited Elements For Elementor (Free Widgets, Addons, Templates) <= 1.5.65 – Missing Authorization
CVE ID: CVE-2023-31080
CVSS Score: 6.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9d49e28b-8b5e-4c67-a36d-c78ee33ffc6e
ProfilePress <= 4.10.3 – Reflected Cross-Site Scripting via error message
CVE ID: CVE Unknown
CVSS Score: 6.1 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/041e635a-9f97-4f54-8ecb-57bbbc321cfc
Export All URLs <= 4.5 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-3118
CVSS Score: 6.1 (Medium)
Researcher/s: Christiaan Swiers
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/066c9327-6d72-41f9-895e-d14fe6471832
Gravity Forms <= 2.7.4 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-2701
CVSS Score: 6.1 (Medium)
Researcher/s: Fioravante Souza
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/234df0e5-d1be-4354-8bfc-761bed1e9aa9
WooCommerce Bulk Stock Management <= 2.2.33 – Cross-Site Scripting
CVE ID: CVE-2023-35918
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2f5d874a-d70e-4d3f-a9aa-d24707a3f7f4
Complianz <= 6.4.4 (Premium <= 6.4.6.1) – Cross-Site Request Forgery to Stored Cross-Site Scripting
CVE ID: CVE-2023-33333
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/47941722-acaf-4f72-a64d-d01dc5e84adf
Companion Sitemap Generator <= 4.5.1.1 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-1780
CVSS Score: 6.1 (Medium)
Researcher/s: Erwan LR
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4a9df582-0ead-45ff-aeaa-1bee9d470b41
Five Star Restaurant Reservations <= 2.6.7 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-34017
CVSS Score: 6.1 (Medium)
Researcher/s: yuyudhn
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6d420e73-24d5-4da8-8257-e0c7f0273031
Booking Calendar Contact Form <= 1.2.40 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-36384
CVSS Score: 6.1 (Medium)
Researcher/s: BOT
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9f4a3d17-d9fd-4ff4-a4b2-43030cdc7739
WP Sticky Social <= 1.0.1 – Cross-Site Request Forgery to Stored Cross-Site Scripting
CVE ID: CVE-2023-3320
CVSS Score: 6.1 (Medium)
Researcher/s: Shunsuke Aoki
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313
teachPress <= 9.0.2 – Reflected Cross-Site Scripting via meta_field_id and cite_id
CVE ID: CVE-2023-36501
CVSS Score: 6.1 (Medium)
Researcher/s: Le Ngoc Anh
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a33cc275-aa0d-4b8b-863a-6a32fac37512
Contact Form by WPForms (Free and Premium) <= 1.8.1.2 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-30500
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b10303e0-c864-4088-91d1-d38c24094812
Restrict Content <= 3.2.2 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-3182
CVSS Score: 6.1 (Medium)
Researcher/s: Erwan LR
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cfbd41fa-15f0-473a-be5a-862e8a14b287
Balkon <= 1.3.2 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-36502
CVSS Score: 6.1 (Medium)
Researcher/s: FearZzZz
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cfcc1a4d-c6c7-4ca8-afe5-79298e7ad3d7
MainWP Child <= 4.4.1.1 – Information Disclosure via Back-Up Files
CVE ID: CVE-2023-3132
CVSS Score: 5.9 (Medium)
Researcher/s: Robert Lockwood
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414
OOPSpam Anti-Spam <= 1.1.44 – Cross-Site Request Forgery via empty_ham_entries and empty_spam_entries
CVE ID: CVE-2023-35913
CVSS Score: 5.4 (Medium)
Researcher/s: Skalucy
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/479f7e9c-8918-4b87-b33d-a396276fb637
Enable SVG, WebP & ICO Upload <= 1.0.3 – Authenticated (Author+) Stored Cross-Site Scripting via SVG
CVE ID: CVE-2023-2143
CVSS Score: 5.4 (Medium)
Researcher/s: Mateus Machado Tesser
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6df7bd57-7d2f-4098-b2d0-ffb2e8ed5868
Metform Elementor Contact Form Builder <= 3.3.2 – Cross-Site Request Forgery via permalink_setup
CVE ID: CVE-2023-2517
CVSS Score: 5.4 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ca66afc3-a749-4ddc-8e2f-959f65cebd45
Greeklish-permalink <= 3.3 – Missing Authorization via cyrtrans_ajax_old AJAX action
CVE ID: CVE-2023-2495
CVSS Score: 5.3 (Medium)
Researcher/s: Jonas Höbenreich
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3be0e82c-f9a8-42a5-9abb-24cc60e03944
Gutenverse <= 1.8.5 – Missing Authorization via ‘data/update’ API Endpoint
CVE ID: CVE-2023-35875
CVSS Score: 5.3 (Medium)
Researcher/s: Mika
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4c4e1d2c-bb20-40b7-90a3-96df68d083b8
Restrict Content <= 3.2.2 – Missing Authorization to Notice Dismissal
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/79bb311d-d10d-4e4e-b690-84c0051b9911
BBS e-Popup <= 2.4.5 – Missing Authorization
CVE ID: CVE-2023-36504
CVSS Score: 5.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/7ae5bbd0-2f95-41f3-a484-a9bb21b23b0e
EventON <= 2.1 – Missing Authorization to Event Access
CVE ID: CVE-2023-2796
CVSS Score: 5.3 (Medium)
Researcher/s: Miguel Santareno
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/dba3f3a6-3f55-4f4e-98e4-bb98d9c94bdd
ReDi Restaurant Reservation <= 23.0211 – Missing Authorization
CVE ID: CVE-2023-36510
CVSS Score: 5.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e7ebf975-0fa7-43cd-a4fe-99284ad3aaf6
Core Web Vitals & PageSpeed Booster <= 1.0.12 – Open Redirect via _wp_http_referer
CVE ID: CVE-2023-35883
CVSS Score: 4.7 (Medium)
Researcher/s: Le Ngoc Anh
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5fe374ff-85eb-4285-8d51-71e9275613cc
Smoothscroller <= 1.0.0 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-23811
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmanwan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3aca1995-2408-423d-afb6-6cf452fbee37
Float menu <= 5.0.2 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3225
CVSS Score: 4.4 (Medium)
Researcher/s: Dipak Panchal
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5b6739b5-0df4-49b2-a655-4f0cff5886b7
MojoPlug Slide Panel <= 1.1.2 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-23807
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/639a46b3-d19f-4ab4-995e-fd3de556b76e
PrePost SEO <= 3.0 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-2029
CVSS Score: 4.4 (Medium)
Researcher/s: Taurus Omar
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/93385acc-aede-4948-b64e-d1ab23167d17
Extra User Details <= 0.5 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-35878
CVSS Score: 4.4 (Medium)
Researcher/s: LEE SE HYOUNG
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a2362dea-8c4a-426f-9482-b7e19b8f5f4e
Customer Service Software & Support Ticket System <= 5.12.0 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b27338c7-2fbc-4985-a25e-8e2a9fdef8c3
About Me 3000 widget <= 2.2.6 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3369
CVSS Score: 4.4 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d
wpView <= 1.3.0 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-33213
CVSS Score: 4.4 (Medium)
Researcher/s: Bae Song Hyun
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c4cad108-6574-4f14-8a37-89c4c10279d6
AN_GradeBook <= 5.0.1 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-2709
CVSS Score: 4.4 (Medium)
Researcher/s: Bob Matyas
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d574ed8b-2887-4a56-9fca-914148095ba1
Image Protector <= 1.1 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-2026
CVSS Score: 4.4 (Medium)
Researcher/s: Shreya Pohekar
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f8a2a23c-23bf-4f23-8b9d-1d6fe869d705
Buy Me a Coffee – Button and Widget Plugin <= 3.6 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-2578
CVSS Score: 4.4 (Medium)
Researcher/s: Felipe Restrepo Rodriguez
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f8f3ce3d-ae8a-4c0f-a74d-657225a932f1
WooCommerce Square <= 3.8.1 – Missing Authorization via multiple AJAX actions
CVE ID: CVE-2023-35876
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0660d753-177e-419a-9e81-3ee2d08cfbc0
WooCommerce PayPal Payments <= 2.0.4 – Cross-Site Request Forgery
CVE ID: CVE-2023-35917
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1023edcb-9879-4dde-b62e-3ce65d7fef2f
Complianz <= 6.4.5 (Premium <= 6.4.7) – Cross-Site Request Forgery
CVE ID: CVE-2023-34030
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/17ab4800-0afd-4c39-970a-bd8dcc6a8b93
MyCurator Content Curation <= 3.74 – Cross-Site Request Forgery
CVE ID: CVE-2023-32104
CVSS Score: 4.3 (Medium)
Researcher/s: Nguyen Xuan Chien
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3301899e-5c38-4ecd-b095-6e00b0f7582e
Extra User Details <= 0.5 – Cross-Site Request Forgery
CVE ID: CVE-2023-35877
CVSS Score: 4.3 (Medium)
Researcher/s: LEE SE HYOUNG
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/81463022-c075-40e8-962d-b2ca27fd4f70
Gallery Metabox <= 1.5 – Missing Authorization via refresh_metabox
CVE ID: CVE-2023-2562
CVSS Score: 4.3 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f
Potent Donations for WooCommerce <= 1.1.9 – Cross-Site Request Forgery in hm_wcdon_admin_page
CVE ID: CVE-2023-35912
CVSS Score: 4.3 (Medium)
Researcher/s: qilin_99
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/98358366-7cb0-40ae-a931-10985c916af1
WooCommerce Brands <= 1.6.49 – Cross-Site Request Forgery
CVE ID: CVE-2023-35880
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a26a6f28-4a7f-421d-a69e-2afbe1367106
WP-Members Membership <= 3.4.7.3 – Cross-Site Request Forgery to Settings Update
CVE ID: CVE-2023-2869
CVSS Score: 4.3 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/dabc2ae0-6005-4287-b1b0-385bc6d5c467
WP Mail Logging <= 1.11.2 – Missing Authorization to Notice Dismissal
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/de00d13b-fab9-4284-9594-abd000fbb7ef
Gallery Metabox <= 1.5 – Missing Authorization via gallery_remove
CVE ID: CVE-2023-2561
CVSS Score: 4.3 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (June 19, 2023 to June 25, 2023) appeared first on Wordfence.