Did you know we’re running a Bug Bounty Extravaganza again?
Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure!
Last week, there were 119 vulnerabilities disclosed in 85 WordPress Plugins and 3 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 44 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 14,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
WAF-RULE-681 – Data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Patched
69
Unpatched
50
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Medium Severity
104
High Severity
12
Critical Severity
3
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
33
Missing Authorization
23
Cross-Site Request Forgery (CSRF)
21
Improper Access Control
9
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
9
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
6
Information Exposure
4
Protection Mechanism Failure
3
Server-Side Request Forgery (SSRF)
3
Incorrect Authorization
2
Authentication Bypass Using an Alternate Path or Channel
1
Authorization Bypass Through User-Controlled Key
1
Deserialization of Untrusted Data
1
Improper Control of Generation of Code (‘Code Injection’)
1
Improper Input Validation
1
Unrestricted Upload of File with Dangerous Type
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
35
11
9
6
5
4
4
3
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
Adsmonetizer
adsensei-b30
Advanced iFrame
advanced-iframe
AI Engine
ai-engine
ArtiBot Free Chat Bot for WordPress WebSites
artibot
AWeber – Free Sign Up Form and Landing Page Builder Plugin for Lead Generation and Email Newsletter Growth
aweber-web-form-widget
Beaver Builder – WordPress Page Builder
beaver-builder-lite-version
Booking for Appointments and Events Calendar – Amelia
ameliabooking
Bulk Edit Post Titles
bulk-edit-post-titles
Calculated Fields Form
calculated-fields-form
Categorify – WordPress Media Library Category & File Manager
categorify
Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back
chat-bubble
CodeMirror Blocks
wp-codemirror-block
Coming Soon Page & Maintenance Mode
responsive-coming-soon
Comments Extra Fields For Post,Pages and CPT
wp-comment-fields
Complianz – GDPR/CCPA Cookie Consent
complianz-gdpr
Configure SMTP
configure-smtp
Contact Form 7 – PayPal & Stripe Add-on
contact-form-7-paypal-add-on
Conversios – Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce
enhanced-e-commerce-for-woocommerce-store
Custom Field Suite
custom-field-suite
Custom fields shortcode
custom-fields-shortcode
Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan
antihacker
Download Manager
download-manager
Download Media
download-media
Duitku Payment Gateway
duitku-social-payment-gateway
Easy PayPal & Stripe Buy Now Button
wp-ecommerce-paypal
Ebook Store
ebook-store
Elementor Website Builder Pro
elementor-pro
Envo’s Elementor Templates & Widgets for WooCommerce
envo-elementor-for-woocommerce
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
essential-blocks
Events Manager – Calendar, Bookings, Tickets, and more!
events-manager
Exclusive Addons for Elementor
exclusive-addons-for-elementor
Finale Lite – Sales Countdown Timer & Discount for WooCommerce
finale-woocommerce-sales-countdown-timer-discount
Fontific | Google Fonts
fontific
Friends
friends
GenerateBlocks
generateblocks
Gestpay for WooCommerce
gestpay-for-woocommerce
Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers
rafflepress
Gutenberg Blocks by Kadence Blocks – Page Builder Features
kadence-blocks
Image Optimizer, Resizer and CDN – Sirv
sirv
LifterLMS – WordPress LMS Plugin for eLearning
lifterlms
LiteSpeed Cache
litespeed-cache
Login as User or Customer
login-as-customer-or-user
MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance
mainwp
Marketing Optimizer
marketing-optimizer
Master Slider – Responsive Touch Slider
master-slider
Media Alt Renamer
media-alt-renamer
Migration, Backup, Staging – WPvivid
wpvivid-backuprestore
Nextend Social Login and Register
nextend-facebook-connect
NextMove Lite – Thank You Page for WooCommerce
woo-thank-you-page-nextmove-lite
NotificationX – Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor
notificationx
Oliver POS – A WooCommerce Point of Sale (POS)
oliver-pos
Orbit Fox by ThemeIsle
themeisle-companion
Page Duplicator
wp-page-duplicator
Page Restrict
pagerestrict
Page Restriction WordPress (WP) – Protect WP Pages/Post
page-and-post-restriction
PayU India – Official Plugin
payu-india
postMash – custom post order
postmash
Premium Addons for Elementor
premium-addons-for-elementor
Redirects
redirects
Restaurant Solutions – Checklist
restaurant-solutions-checklist
Restrict User Access – Ultimate Membership & Content Protection
restrict-user-access
Rolo Slider
rolo-slider
Seraphinite Accelerator
seraphinite-accelerator
Simple Tweet
simple-tweet
Slider Responsive Slideshow – Image slider, Gallery slideshow
slider-responsive-slideshow
Slivery Extender
slivery-extender
SMS Alert Order Notifications – WooCommerce
sms-alert
SoundCloud Shortcode
soundcloud-shortcode
Tainacan
tainacan
Thank You Page Customizer for WooCommerce – Increase Your Sales
woo-thank-you-page-customizer
Ultimate Bootstrap Elements for Elementor
ultimate-bootstrap-elements-for-elementor
Under Construction / Maintenance Mode from Acurax
coming-soon-maintenance-mode-from-acurax
User Shortcodes Plus
user-shortcodes-plus
Visual Composer Website Builder, Landing Page Builder, Custom Theme Builder, Maintenance Mode & Coming Soon Pages
visualcomposer
Watermark RELOADED
watermark-reloaded
WooCommerce Coupon Popup, SmartBar, Slide In | MyShopKit
myshopkit-popup-smartbar-slidein
WordPress Access Control
wordpress-access-control
WP eCommerce
wp-e-commerce
WP Private Content Plus
wp-private-content-plus
WP Shortcodes Plugin — Shortcodes Ultimate
shortcodes-ultimate
WP Show Posts
wp-show-posts
Wp Social Login and Register Social Counter
wp-social
WP Social Widget
wp-social-widget
WPvivid Backup for MainWP
wpvivid-backup-mainwp
蜜蜂采集-BeePress 微信公众号今日头条知乎专栏简书等平台文章采集插件
beepress
WordPress Themes with Reported Vulnerabilities Last Week
Software Name
Software Slug
Avada | Website Builder For WordPress & WooCommerce
fusion-builder
Avada | Website Builder For WordPress & WooCommerce
Avada
Yuki
yuki
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-1698
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-1514
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-1981
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-1468
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-1203
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-0786
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-1859
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-27191
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
High (8.2)
CVE-ID
CVE-2024-27194
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
High (8.2)
CVE-ID
CVE-2024-27195
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
High (8.1)
CVE-ID
CVE-2023-7247
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-1793
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-2020
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-1935
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2023-40000
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-0378
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1668
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-27197
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1860
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1566
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1438
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1763
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-1982
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1074
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1791
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2023-6809
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2023-6954
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1854
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1234
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1414
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1413
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2028
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1541
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-27949
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1449
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1434
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1323
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1499
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1497
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1680
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1568
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-0700
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-25936
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1398
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2132
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2023-6880
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-1808
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-27189
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (6.3)
CVE-ID
CVE-2024-1954
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-1437
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-1484
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-27192
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-27193
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-27196
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-1383
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-1978
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2023-6326
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-1775
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-1687
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1136
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2023-6785
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0631
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0377
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2023-45000
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1120
Patch Status
Patched
Published
Feb 29, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1368
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0682
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0681
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0687
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1435
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1686
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1476
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2023-6969
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1436
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0975
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1516
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0680
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1479
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (5.0)
CVE-ID
CVE-2024-0447
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (4.9)
CVE-ID
CVE-2024-1341
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-0449
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-0898
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-0689
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-23501
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-0614
Patch Status
Patched
Published
Feb 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-0611
Patch Status
Unpatched
Published
Mar 1, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-1977
Patch Status
Unpatched
Published
Feb 28, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0369
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1906
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1910
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1907
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1909
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1912
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0385
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1652
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1649
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1650
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1653
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0830
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0829
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1592
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1861
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-27190
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1719
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-23523
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0767
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0768
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0766
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1452
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0432
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0431
Patch Status
Unpatched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0433
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-27950
Patch Status
Patched
Published
Mar 1, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1642
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1976
Patch Status
Unpatched
Published
Feb 28, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1489
Patch Status
Patched
Published
Feb 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2023-6922
Patch Status
Unpatched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1388
Patch Status
Patched
Published
Feb 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1943
Patch Status
Patched
Published
Feb 27, 2024
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (February 26, 2024 to March 3, 2024) appeared first on Wordfence.