(647) 243-4688

Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $10,400, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest. 

Last week, there were 68 vulnerabilities disclosed in 51 WordPress Plugins and 2 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 28 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 17,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our PremiumCare, and Response customers last week:

User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor <= 3.11.8 – Authentication Bypass
WAF-RULE-721 – Data redacted while we work with the vendor on a patch.

Wordfence PremiumCare, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.

Total Unpatched & Patched Vulnerabilities Last Week

Patch Status
Number of Vulnerabilities

Patched
41

Unpatched
27

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating
Number of Vulnerabilities

Medium Severity
48

High Severity
14

Critical Severity
6

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE
Number of Vulnerabilities

Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
20

Missing Authorization
14

Information Exposure
11

Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
6

Cross-Site Request Forgery (CSRF)
4

Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
4

Unrestricted Upload of File with Dangerous Type
3

Deserialization of Untrusted Data
2

Authentication Bypass Using an Alternate Path or Channel
1

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
1

Incorrect Privilege Assignment
1

Server-Side Request Forgery (SSRF)
1

Researchers That Contributed to WordPress Security Last Week

Researcher Name
Number of Vulnerabilities

11

9

9

5

4

3

3

3

2

2

2

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.

WordPress Plugins with Reported Vulnerabilities Last Week

Software Name
Software Slug

Add Admin CSS

add-admin-css

Add Admin JavaScript

add-admin-javascript

Admin Post Navigation

admin-post-navigation

Admin Trim Interface

admin-trim-interface

AI Engine

ai-engine

All-in-One Video Gallery

all-in-one-video-gallery

AMP for WP – Accelerated Mobile Pages

accelerated-mobile-pages

Aramex Shipping WooCommerce

aramex-shipping-woocommerce

aThemes Starter Sites

athemes-starter-sites

Campaign Monitor for WordPress

forms-for-campaign-monitor

Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder

fluentform

Custom Query Blocks

post-type-archive-mapping

Flipbox Builder

flipbox-builder

Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells

funnel-builder

Great Restaurant Menu WP

best-restaurant-menu-by-pricelisto

Grow by Tradedoubler – Advertiser Plugin for WooCommerce

tradedoubler-affiliate-tracker

Happy Addons for Elementor

happy-elementor-addons

Icegram Engage – Ultimate WP Popup Builder, Lead Generation, Optins, and CTA

icegram

IgnitionDeck Crowdfunding Platform

ignitiondeck

Image SEO – AI-Driven Image SEO Optimizer

imageseo

Intelligence

intelligence

Language Translate Widget for WP – ConveyThis

conveythis-translate

LearnPress – WordPress LMS Plugin

learnpress

ListingPro Plugin

listingpro-plugin

LiteSpeed Cache

litespeed-cache

Master Currency WP

mastercurrency-wp

MaxiBlocks: 2200+ Patterns, 190 Pages, 14.2K Icons & 100 Styles

maxi-blocks

Media.net Ads Manager

media-net-ads-manager

News Element Elementor Blog Magazine

news-element

Ninja Forms – The Contact Form Builder That Grows With You

ninja-forms

One Click Close Comments

one-click-close-comments

ParityPress – Parity Pricing with Discount Rules

paritypress

Photo Gallery, Images, Slider in Rbs Image Gallery

robo-gallery

Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery

nextgen-gallery

Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

contest-gallery

Piotnet Addons For Elementor

piotnet-addons-for-elementor

PowerPack for Beaver Builder

bbpowerpack

Pretty Simple Popup Builder

pretty-simple-popup-builder

Redux Framework

redux-framework

Royal Elementor Addons and Templates

royal-elementor-addons

Social Auto Poster

social-auto-poster

Timetable and Event Schedule by MotoPress

mp-timetable

Tutor LMS – Migration Tool

tutor-lms-migration-tool

Ultimate WordPress Auction Plugin

ultimate-auction

WooCommerce – PDF Vouchers

woocommerce-pdf-vouchers

WooCommerce Product Table Lite

wc-product-table-lite

WP Booking Calendar

booking

WP EasyPay – Square for WordPress

wp-easy-pay

Wp EMember

wp-emember

WP Meteor Website Speed Optimization Addon

wp-meteor

Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress

youzify

WordPress Themes with Reported Vulnerabilities Last Week

Software Name
Software Slug

Himalayas

himalayas

ListingPro – WordPress Directory & Listing Theme

listingpro

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-39622
Patch Status
Unpatched
Published
Jul 22, 2024

CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-38795
Patch Status
Unpatched
Published
Jul 22, 2024

Affected Software
ListingPro Plugin
Researcher

CVSS Rating
Critical (9.9)
CVE-ID
CVE-2024-39620
Patch Status
Unpatched
Published
Jul 22, 2024

Affected Software
ListingPro Plugin
Researcher

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-6460
Patch Status
Unpatched
Published
Jul 26, 2024

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-39619
Patch Status
Unpatched
Published
Jul 22, 2024

Affected Software
ListingPro Plugin
Researcher

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-6459
Patch Status
Unpatched
Published
Jul 27, 2024

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-38793
Patch Status
Patched
Published
Jul 22, 2024

Affected Software
Great Restaurant Menu WP
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6152
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Flipbox Builder
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6589
Patch Status
Patched
Published
Jul 24, 2024

Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39624
Patch Status
Unpatched
Published
Jul 22, 2024

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39623
Patch Status
Unpatched
Published
Jul 22, 2024

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6431
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Media.net Ads Manager
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39633
Patch Status
Patched
Published
Jul 24, 2024

Affected Software
PowerPack for Beaver Builder
Researcher

CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6756
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
High (8.3)
CVE-ID
CVE-2024-39621
Patch Status
Unpatched
Published
Jul 22, 2024

Affected Software
ListingPro Plugin
Researcher

CVSS Rating
High (7.3)
CVE-ID
CVE-2024-6750
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
High (7.3)
CVE-ID
CVE-2024-7027
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
WooCommerce – PDF Vouchers
Researcher

CVSS Rating
High (7.2)
CVE-ID
CVE-2024-6828
Patch Status
Patched
Published
Jul 22, 2024

Affected Software
Redux Framework
Researcher

CVSS Rating
High (7.2)
CVE-ID
CVE-2024-6753
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
Medium (6.6)
CVE-ID
CVE-2024-39630
Patch Status
Unpatched
Published
Jul 22, 2024

CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-6755
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-38791
Patch Status
Patched
Published
Jul 22, 2024

Affected Software
AI Engine
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6629
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
All-in-One Video Gallery
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6897
Patch Status
Patched
Published
Jul 26, 2024

Affected Software
aThemes Starter Sites
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6627
Patch Status
Patched
Published
Jul 26, 2024

Affected Software
Happy Addons for Elementor
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6634
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Master Currency WP

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6752
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6458
Patch Status
Patched
Published
Jul 26, 2024

Affected Software
WooCommerce Product Table Lite
Researcher

CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6930
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
WP Booking Calendar
Researcher

CVSS Rating
Medium (6.3)
CVE-ID
CVE-2024-6751
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Social Auto Poster
Researcher

CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-3246
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
LiteSpeed Cache
Researcher

CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-5744
Patch Status
Patched
Published
Jul 23, 2024

Affected Software
Wp EMember
Researcher

CVSS Rating
Medium (5.8)
CVE-ID
CVE-2024-6591
Patch Status
Unpatched
Published
Jul 26, 2024

Researcher

CVSS Rating
Medium (5.5)
CVE-ID
CVE-2024-6661
Patch Status
Unpatched
Published
Jul 26, 2024

CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-4410
Patch Status
Unpatched
Published
Jul 26, 2024

Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6547
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Add Admin CSS
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6548
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Add Admin JavaScript
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6549
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Admin Post Navigation
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6545
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Admin Trim Interface
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6566
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Aramex Shipping WooCommerce
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6569
Patch Status
Patched
Published
Jul 26, 2024

Affected Software
Campaign Monitor for WordPress
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-38794
Patch Status
Patched
Published
Jul 22, 2024

Affected Software
Custom Query Blocks
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-39625
Patch Status
Patched
Published
Jul 22, 2024

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6573
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Intelligence
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6546
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
One Click Close Comments
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6571
Patch Status
Patched
Published
Jul 23, 2024

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-5614
Patch Status
Patched
Published
Jul 26, 2024

Affected Software
Piotnet Addons For Elementor
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1798
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Tutor LMS – Migration Tool
Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-5861
Patch Status
Patched
Published
Jul 23, 2024

Researcher

CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6553
Patch Status
Patched
Published
Jul 23, 2024

CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39629
Patch Status
Unpatched
Published
Jul 22, 2024

Affected Software
Himalayas
Researcher

CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39627
Patch Status
Patched
Published
Jul 22, 2024

CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39626
Patch Status
Unpatched
Published
Jul 22, 2024

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-39628
Patch Status
Patched
Published
Jul 24, 2024

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1804
Patch Status
Unpatched
Published
Jul 26, 2024

Affected Software
Tutor LMS – Migration Tool
Researcher

CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-39635
Patch Status
Patched
Published
Jul 24, 2024

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (July 22, 2024 to July 28, 2024) appeared first on Wordfence.