Did you know we’re running a Bug Bounty Extravaganza again?
Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through February 29th, 2024 when you opt to have Wordfence handle responsible disclosure!
Last week, there were 76 vulnerabilities disclosed in 62 WordPress Plugins and 1 WordPress Theme that have been added to the Wordfence Intelligence Vulnerability Database, and there were 30 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 14,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
WAF-RULE-678 – data redacted while we work with the vendor on a patch.
Bricks <= 1.9.6 – Unauthenticated Remote Code Execution
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Patched
58
Unpatched
18
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Medium Severity
62
High Severity
3
Critical Severity
11
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
31
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
9
Missing Authorization
9
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
6
Cross-Site Request Forgery (CSRF)
4
Improper Access Control
3
Information Exposure
3
Improper Control of Generation of Code (‘Code Injection’)
2
Information Exposure Through Log Files
2
Protection Mechanism Failure
2
Unrestricted Upload of File with Dangerous Type
2
Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
1
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
1
Server-Side Request Forgery (SSRF)
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
7
7
7
5
4
4
4
3
3
3
3
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
Action Network
Best WordPress Gallery Plugin – FooGallery
Bold Page Builder
Booster for WooCommerce
Broken Link Checker
Canto
Comments Like Dislike
Community by PeepSo – Social Network, Membership, Registration, User Profiles
Custom Field Template
Cwicly
Defender Security – Malware Scanner, Login Security & Firewall
Directorist – WordPress Business Directory Plugin with Classified Ads Listings
Doofinder WP & WooCommerce Search
Easy Forms for Mailchimp
yikes-inc-easy-mailchimp-extender
Elementor Addons by Livemesh
Email Encoder – Protect Email Addresses and Phone Numbers
EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor
Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders
essential-addons-for-elementor-lite
Frontend File Manager Plugin
Happy Addons for Elementor
InstaWP Connect – 1-click WP Staging & Migration
Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages
Malware Scanner
Maspik – Spam Blacklist
MasterStudy LMS WordPress Plugin – for Online Courses and Education
masterstudy-lms-learning-management-system
Microsoft Clarity
moveto
Multi Step Form
My Private Site
MyWaze
NEX-Forms – Ultimate Form Builder – Contact forms and much more
nex-forms-express-wp-form-builder
Ocean Extra
Page scroll to id
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction
Paytium: Mollie payment forms & donations
PB oEmbed HTML5 Audio – with Cache Support
pb-oembed-html5-audio-with-cache-support
Peach Payments Gateway
Pexels: Free Stock Photos
Piraeus Bank WooCommerce Payment Gateway
woo-payment-gateway-for-piraeus-bank
PJ News Ticker
postMash – custom post order
PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)
Premium Addons for Elementor
Simple Share Buttons Adder
SiteOrigin Widgets Bundle
Sitepact’s Contact Form 7 Extension For Klaviyo
sitepact-klaviyo-contact-form-7
SKT Page Builder
SMTP Mail
Sunshine Photo Cart: Free Client Galleries for Photographers
Sydney Toolbox
SysBasics Easy Checkout Field Editor, Fees & Discounts
TinyMCE and TinyMCE Advanced Professsional Formats and Styles
tinymce-and-tinymce-advanced-professsional-formats-and-styles
TNC PDF viewer
Ultimate Posts Widget
Ultimate Reviews
Widgets Controller
WP Activity Log
WP Editor
WP Maintenance
WP Setup Wizard
WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc
wp-media-folder
WordPress Themes with Reported Vulnerabilities Last Week
Software Name
Software Slug
Bricks
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (February 12, 2024 to February 18, 2024) appeared first on Wordfence.