Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $10,400, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.
Last week, there were 99 vulnerabilities disclosed in 82 WordPress Plugins and no WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 44 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 16,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Login/Signup Popup ( Inline Form + Woocommerce ) 2.7.1 – 2.7.2 – Missing Authorization to Arbitrary Options Update
WAF-RULE-702 – data redacted while we work with the vendor on a patch.
WAF-RULE-703 – data redacted while we work with the vendor on a patch.
WAF-RULE-704 – data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Patched
64
Unpatched
35
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Medium Severity
80
High Severity
12
Critical Severity
7
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
55
Cross-Site Request Forgery (CSRF)
13
Missing Authorization
10
Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
5
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
4
Server-Side Request Forgery (SSRF)
4
Authentication Bypass Using an Alternate Path or Channel
2
Improper Access Control
1
Improper Authorization
1
Improper Check or Handling of Exceptional Conditions
1
Improper Neutralization of Alternate XSS Syntax
1
Improper Neutralization of Special Elements Used in a Template Engine
1
Unrestricted Upload of File with Dangerous Type
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
11
9
9
7
5
4
4
3
3
3
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
ActiveDEMAND
activedemand
AffiEasy
affieasy
AppPresser – Mobile App Framework
apppresser
Auto Featured Image (Auto Post Thumbnail)
auto-post-thumbnail
Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection
stopbadbots
Blocksy Companion
blocksy-companion
CB (legacy)
commons-booking
Church Admin
church-admin
Comparison Slider
comparison-slider
Contact Form Manager
contact-form-manager
Content Blocks (Custom Post Widget)
custom-post-widget
CSSable Countdown
cssable-countdown
DethemeKit For Elementor
dethemekit-for-elementor
DOP Shortcodes
dop-shortcodes
Download Manager
download-manager
Download Monitor
download-monitor
Easy Digital Downloads – Recent Purchases
edd-recent-purchases
Elements For Elementor
nd-elements
Essential Addons for Elementor Pro
essential-addons-elementor
Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders
essential-addons-for-elementor-lite
Expert Invoice
expert-invoice
Fetch JFT
fetch-jft
Font Farsi
font-farsi
FV Flowplayer Video Player
fv-wordpress-flowplayer
Global Notification Bar
global-notification-bar
Google CSE
google-cse
Gum Elementor Addon
gum-elementor-addon
Happy Addons for Elementor
happy-elementor-addons
HTML5 Video Player – Best WordPress Video Player Plugin and Block
html5-video-player
HUSKY – Products Filter Professional for WooCommerce
woocommerce-products-filter
Integration for Constant Contact and Contact Form 7, WPForms, Elementor, Ninja Forms
cf7-constant-contact
Just Writing Statistics
just-writing-statistics
Lightbox & Modal Popup WordPress Plugin – FooBox
foobox-image-lightbox
Lightbox & Modal Popup WordPress Plugin – FooBox Premium
foobox-image-lightbox-premium
List categories
list-categories
Login Logout Register Menu
login-logout-register-menu
Login with phone number
login-with-phone-number
Master Slider – Responsive Touch Slider
master-slider
Ninja Tables – Easiest Data Table Builder
ninja-tables
Page Builder Gutenberg Blocks – CoBlocks
coblocks
Popup Builder – Create highly converting, mobile friendly marketing popups.
popup-builder
Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX
ultimate-post
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
powerpack-lite-for-elementor
Preferred Languages
preferred-languages
Premium Addons for Elementor
premium-addons-for-elementor
QQWorld Auto Save Images
qqworld-auto-save-images
Random Banner
random-banner
Remote Content Shortcode
remote-content-shortcode
Responsive Owl Carousel for Elementor
responsive-owl-carousel-elementor
Responsive video embed
responsive-video-embed
Royal Elementor Addons and Templates
royal-elementor-addons
Safety Exit
safety-exit
Shield Security – Smart Bot Blocking & Intrusion Prevention Security
wp-simple-firewall
Simple Like Page Plugin
simple-facebook-plugin
Simple Spoiler
simple-spoiler
Site Favicon
site-favicon
Slider Revolution
revslider
Smartarget Message Bar
smartarget-message-bar
Supreme Modules Lite – Divi Theme, Extra Theme and Divi Builder
supreme-modules-for-divi
Swiss Toolkit For WP
swiss-toolkit-for-wp
Testimonial Carousel For Elementor
testimonials-carousel-elementor
The Plus Addons for Elementor Page Builder
theplus_elementor_addon
Unlimited Elements For Elementor (Free Widgets, Addons, Templates)
unlimited-elements-for-elementor
Uploadcare File Uploader and Adaptive Delivery (beta)
uploadcare
User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin
user-registration
Visual Website Collaboration, Feedback & Project Management – Atarim
atarim-visual-collaboration
Widget Bundle
wp-widget-bundle
Woocommerce – Recent Purchases
woo-recent-purchases
WordPress Infinite Scroll – Ajax Load More
ajax-load-more
WordPress Tour & Travel Booking Plugin for WooCommerce – WpTravelly
tour-booking-manager
WP Back Button
wp-back-button
WP Logs Book
wp-logs-book
WP STAGING WordPress Backup Plugin – Migration Backup Restore
wp-staging
WP To Do
wp-todo
WP TripAdvisor Review Slider
wp-tripadvisor-review-slider
WPB Elementor Addons
wpb-elementor-addons
WPCafe – Online Food Ordering, Restaurant Menu, Delivery, and Reservations for WooCommerce
wp-cafe
wpDataTables (Premium)
wpdatatables
wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin
wpdatatables
wpForo Forum
wpforo
YITH WooCommerce Wishlist
yith-woocommerce-wishlist
Yumpu ePaper publishing
yumpu-epaper-publishing
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-5522
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-3820
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Critical (9.9)
CVE-ID
CVE-2024-3200
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-35629
Patch Status
Unpatched
Published
May 27, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-5150
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Critical (9.1)
CVE-ID
CVE-2024-3412
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Critical (9.1)
CVE-ID
CVE-2024-35630
Patch Status
Patched
Published
May 27, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-3564
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-5348
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-5326
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-5345
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-5204
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2023-6743
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
High (8.1)
CVE-ID
CVE-2024-4611
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-3821
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-2793
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-35634
Patch Status
Unpatched
Published
May 27, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-4477
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
High (7.1)
CVE-ID
CVE-2024-4958
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-4218
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2023-7073
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4422
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2295
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3565
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5418
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4377
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4160
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5073
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5086
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4668
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5041
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5347
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5039
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4356
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3726
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2023-6382
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2933
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2506
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5223
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5327
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4376
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5475
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4342
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4087
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3583
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34444
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34443
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5501
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2253
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5341
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4711
Patch Status
Patched
Published
May 31, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3063
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5427
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-35631
Patch Status
Patched
Published
May 27, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-4616
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-35633
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-35637
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-35635
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-3269
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-4379
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-2089
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-3190
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1324
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0434
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (5.0)
CVE-ID
CVE-2024-3277
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4381
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4384
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-5172
Patch Status
Unpatched
Published
May 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4419
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-2657
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35647
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-5656
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35641
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-3276
Patch Status
Patched
Published
May 28, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35644
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35645
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35640
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35639
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35642
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35646
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4970
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-35643
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-3946
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-34385
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-35638
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4355
Patch Status
Patched
Published
May 29, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4382
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4426
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4427
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-35632
Patch Status
Unpatched
Published
May 27, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4205
Patch Status
Patched
Published
May 30, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4344
Patch Status
Patched
Published
Jun 1, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-35636
Patch Status
Unpatched
Published
May 30, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4969
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4475
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4474
Patch Status
Unpatched
Published
May 31, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-3943
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-3945
Patch Status
Unpatched
Published
May 29, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-3947
Patch Status
Unpatched
Published
May 29, 2024
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (May 27, 2024 to June 2, 2024) appeared first on Wordfence.