Last week, there were 64 vulnerabilities disclosed in 66 WordPress Plugins and 3 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 32 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Ultimate Member <= 2.6.6 – Privilege Escalation via Arbitrary User Meta Updates via API
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Unpatched
34
Patched
30
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Low Severity
2
Medium Severity
54
High Severity
6
Critical Severity
2
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Missing Authorization
18
Cross-Site Request Forgery (CSRF)
18
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
16
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
3
Server-Side Request Forgery (SSRF)
2
Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
1
Authorization Bypass Through User-Controlled Key
1
Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
1
Improper Authorization
1
Protection Mechanism Failure
1
Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
1
Use of Hard-coded Cryptographic Key
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
Mika
7
Skalucy
3
Lana Codes
(Wordfence Vulnerability Researcher)
3
longxi
3
yuyudhn
2
Chloe Chamberland
(Wordfence Vulnerability Researcher)
2
Cat
1
konagash
1
Dmitriy
1
Stephen
1
LOURCODE
1
Phd
1
Marco Wotschka
(Wordfence Vulnerability Researcher)
1
thiennv
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
ACF Photo Gallery Field
navz-photo-gallery
AGP Font Awesome Collection
agp-font-awesome-collection
APIExperts Square for WooCommerce
woosquare
Assistant – Every Day Productivity Apps
assistant
Author Box for Authors, Co-Authors, Multiple Authors and Guest Authors – Molongui
molongui-authorship
Backup Migration
backup-backup
Banner Management For WooCommerce
banner-management-for-woocommerce
Blog2Social: Social Media Auto Post & Scheduler
blog2social
Booster Elementor Addons
booster-for-elementor
Change WP Admin Login
change-wp-admin-login
Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget
bit-assist
Church Admin
church-admin
Clone
wp-clone-by-wp-academy
CodeBard’s Patron Button and Widgets for Patreon
patron-button-and-widgets-by-codebard
Contact Form Builder by Bit Form – Easiest Contact Form, Payment Form, Order Form, Calculator Form Builder Plugin for WordPress
bit-form
Custom Field For WP Job Manager
custom-field-for-wp-job-manager
Custom Field Template
custom-field-template
Discussion Board – WordPress Forum Plugin
wp-discussion-board
Donations Made Easy – Smart Donations
smart-donations
Duplicate Post
copy-delete-posts
Enhanced Text Widget
enhanced-text-widget
Fraud Prevention For Woocommerce
woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers
Google Map Shortcode
google-map-shortcode
HTTP Auth
http-auth
InstaWP Connect – 1-click WP Staging & Migration (beta)
instawp-connect
Instant CSS
instant-css
LWS Affiliation
lws-affiliation
Local Development
local-development
Meks Smart Social Widget
meks-smart-social-widget
Mobile Address Bar Changer
mobile-address-bar-changer
MultiParcels Shipping For WooCommerce
multiparcels-shipping-for-woocommerce
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress
ninja-forms
Optimize Database after Deleting Revisions
rvg-optimize-database
Perelink Pro
perelink
Pop-up
pop-up-pop-up
Post to Google My Business (Google Business Profile)
post-to-google-my-business
QR code MeCard/vCard generator
wp-qrcode-me-v-card
Quasar form free – Contact Form Builder for WordPress
quasar-form
RSS Redirect & Feedburner Alternative
feedburner-alternative-and-rss-redirect
Redirection
redirect-redirection
Remove Duplicate Posts
remove-duplicate-posts
SSL Mixed Content Fix
http-https-remover
Saphali Woocommerce Lite
saphali-woocommerce-lite
Schema Pro
wp-schema-pro
Simple Author Box
simple-author-box
Simple Googlebot Visit
simple-googlebot-visit
Simple Wp Sitemap
simple-wp-sitemap
Slider Carousel – Responsive Image Slider
slider-images
Social Media Share Buttons & Social Sharing Icons
ultimate-social-media-icons
Social Share Icons & Social Share Buttons
ultimate-social-media-plus
Taboola
taboola
The Events Calendar
the-events-calendar
Ultimate Posts Widget
ultimate-posts-widget
Update Theme and Plugins from Zip File
update-theme-and-plugins-from-zip-file
User Activity Log
user-activity-log
User Email Verification for WooCommerce
woo-confirmation-email
Video Conferencing with Zoom
video-conferencing-with-zoom-api
WP Clone Menu
clone-menu
WP Quick Post Duplicator
wp-quick-post-duplicator
WPS Limit Login
wps-limit-login
Web Accessibility By accessiBe
accessibe
WordPress Database Administrator
wp-database-admin
cartflows-pro
cartflows-pro
tagDiv Composer
td-composer
wp tell a friend popup form
wp-tell-a-friend-popup-form
wpml-string-translation
wpml-string-translation
WordPress Themes with Reported Vulnerabilities Last Week
Software Name
Software Slug
nsc
nsc
winters
winters
yourjourney
yourjourney
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
InstaWP Connect <= 0.0.9.18 – Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver
CVE ID: CVE-2023-3956
CVSS Score: 9.8 (Critical)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b
LWS Affiliation <= 2.2.6 – Unauthenticated Remote/Local File Inclusion
CVE ID: CVE-2023-32297
CVSS Score: 9.8 (Critical)
Researcher/s: Marco Wotschka, Jonas Höbenreich
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a7b1871d-9d26-4bdc-bd20-0535143902d4
Quasar form <= 6.1 – Authenticated (Subscriber+) SQL Injection via ‘id’
CVE ID: CVE-2023-35910
CVSS Score: 8.8 (High)
Researcher/s: Emili Castells
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/150021d3-71bb-41c0-bb1c-5843e94ec0b6
User Activity Log <= 1.6.4 – Unauthenticated SQL Injection
CVE ID: CVE-2023-3435
CVSS Score: 7.5 (High)
Researcher/s: Marc-Alexandre Montpas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b4ca985e-cae1-4e26-ad2d-413724cfd45d
WordPress Database Administrator <= 1.0.3 – Authenticated (Administrator+) SQL Injection
CVE ID: CVE-2023-3211
CVSS Score: 7.2 (High)
Researcher/s: Christiaan Swiers
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2c314acf-d5bb-433a-8e2d-4ca333944bb6
WPML String Translation <= 3.2.5 – Authenticated (Administrator+) SQL Injection via ‘context’
CVE ID: CVE Unknown
CVSS Score: 7.2 (High)
Researcher/s: Stephen
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2e8f224c-cd22-4926-be24-9da2f22afa50
MultiParcels Shipping For WooCommerce <= 1.15.4 – Unauthenticated Stored Cross-Site Scripting
CVE ID: CVE Unknown
CVSS Score: 7.2 (High)
Researcher/s: Unknown
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c5ce2d08-6e01-4a7c-a2d5-ba98639107a8
Molongui <= 4.6.19 – Unauthenticated Stored Cross-Site Scripting
CVE ID: CVE-2023-39164
CVSS Score: 7.2 (High)
Researcher/s: LEE SE HYOUNG
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cff04656-5930-4324-9ddf-43a2166cdf04
Booster Elementor Addons <= 1.4.9 – Missing Authorization
CVE ID: CVE-2023-38480
CVSS Score: 6.5 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/60ee9cfc-016d-45ee-b3f4-da999d093776
Ninja Forms <= 3.6.25 – Reflected Cross-Site Scripting via ‘data’
CVE ID: CVE-2023-37979
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1460dc44-dd64-4fd6-952b-1f5d4285bfa4
tagDiv Composer <= 4.1 – Cross-Site Request Forgery to Cross-Site Scripting
CVE ID: CVE-2023-39166
CVSS Score: 6.1 (Medium)
Researcher/s: Truoc Phan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/199d3a1f-bfde-4081-bb68-ebb6f9d360b2
User Email Verification for WooCommerce <= 3.5.0 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-39162
CVSS Score: 6.1 (Medium)
Researcher/s: Nguyen Xuan Chien
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/282ef0bb-4db5-4b07-9aad-b128e8fdb915
CodeBard’s Patron Button and Widgets for Patreon <= 2.1.8 – Reflected Cross-Site Scripting via ‘site_account’
CVE ID: CVE-2023-30491
CVSS Score: 6.1 (Medium)
Researcher/s: LOURCODE
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/46f5d1fa-dba7-4882-be29-39dc281d7278
nsc <= 1.0 – Prototype Pollution to Reflected Cross-Site Scripting
CVE ID: CVE-2023-3965
CVSS Score: 6.1 (Medium)
Researcher/s: longxi
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2
Winters <= 1.4.3 – Prototype Pollution to Reflected Cross-Site Scripting
CVE ID: CVE-2023-3962
CVSS Score: 6.1 (Medium)
Researcher/s: longxi
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3
Custom Field Template <= 2.5.9 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-38392
CVSS Score: 6.1 (Medium)
Researcher/s: Phd
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/752a07c4-ae88-4152-b449-68228a54604a
Blog2Social: Social Media Auto Post & Scheduler <= 7.2.0 – Reflected Cross-Site Scripting
CVE ID: CVE Unknown
CVSS Score: 6.1 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a00147db-2ca5-4290-ae13-27be6119b751
AGP Font Awesome Collection <= 3.2.4 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-30481
CVSS Score: 6.1 (Medium)
Researcher/s: Skalucy
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b4df1fc3-ea7e-4f41-a5f0-d3928f8add70
Your Journey <= 1.9.8 – Prototype Pollution to Reflected Cross-Site Scripting
CVE ID: CVE-2023-3933
CVSS Score: 6.1 (Medium)
Researcher/s: longxi
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935
Church Admin <= 3.7.56 – Server-Side Request Forgery via church_admin_import_csv
CVE ID: CVE-2023-38515
CVSS Score: 5.5 (Medium)
Researcher/s: Yuchen Ji
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6ff53647-572f-419f-ad39-965658a10263
Assistant <= 1.4.3 – Authenticated (Editor+) Server Side Request Forgery
CVE ID: CVE Unknown
CVSS Score: 5.5 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9d5ed6cf-ae12-4da5-809f-6a8c61eeb4f6
WP Quick Post Duplicator <= 1.0 – Missing Authorization
CVE ID: CVE-2023-31214
CVSS Score: 5.4 (Medium)
Researcher/s: TaeEun Lee
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/12a576ee-f8a9-4740-b87b-091a46970d53
Discussion Board <= 2.4.8 – Authenticated (Subscriber+) Content Injection
CVE ID: CVE-2023-39161
CVSS Score: 5.4 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2e9d7776-aa96-47c8-9e31-5484ab65bc66
wp tell a friend popup form <= 7.1 – Cross-Site Request Forgery via ‘TellAFriend_admin’
CVE ID: CVE-2023-25463
CVSS Score: 5.4 (Medium)
Researcher/s: yuyudhn
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2f760821-98d4-4154-a4ae-861283f991f8
HTTP Auth <= 0.3.2 – Cross-Site Request Forgery
CVE ID: CVE-2023-27435
CVSS Score: 5.4 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/43357daa-4dce-4851-b41b-48d3ffb8a387
Schema Pro <= 2.7.8 – Authenticated(Contributor+) Missing Authorization
CVE ID: CVE-2023-36683
CVSS Score: 5.4 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/645ab4b9-e421-4610-b99b-960a7fbb7779
Saphali Woocommerce Lite <= 1.8.13 – Cross-Site Request Forgery via ‘woocommerce_saphali_page_s_l’
CVE ID: CVE-2023-25788
CVSS Score: 5.4 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c58d9011-a082-48ca-b702-ef5563af2c66
WP Clone Menu <= 1.0.1 – Missing Authorization to Menu Clone
CVE ID: CVE-2023-38395
CVSS Score: 5.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0bbbefce-4451-410d-bc19-f489318dda4a
APIExperts Square for WooCommerce <= 4.2.8 – Missing Authorization
CVE ID: CVE-2022-47182
CVSS Score: 5.3 (Medium)
Researcher/s: Cat
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0e1193b1-6e5a-4ecc-ae97-1a3129ad330e
Ninja Forms <= 3.6.25 – Missing Authorization to Contributor+ Form Submission Export
CVE ID: CVE-2023-38386
CVSS Score: 5.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6551eea6-1059-4caa-876c-3d08083130f6
Change WP Admin Login <= 1.1.3 – Protection Mechanism Failure to Login Page Disclosure
CVE ID: CVE-2023-3604
CVSS Score: 5.3 (Medium)
Researcher/s: Muhamad Arsyad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9410b5b8-1bb2-42d7-8d4d-721131d392e3
Instant CSS <= 1.1.4 – Missing Authorization via AJAX Actions
CVE ID: CVE-2023-38483
CVSS Score: 5.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b82a9ae8-ff82-40bf-a5d4-5175daab9146
Slider Carousel – Responsive Image Slider <= 1.5.0 – Missing Authorization
CVE ID: CVE-2023-25457
CVSS Score: 5.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c32f1c6a-cf65-419e-bfcd-48ac8e3735bc
Meks Smart Social Widget <= 1.6 – Missing Authorization to notice dimissal
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/eaabaadf-7881-4c4f-8987-fbba8318a458
Custom Field For WP Job Manager <= 1.1 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3328
CVSS Score: 4.4 (Medium)
Researcher/s: Bob Matyas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4f504434-2de9-4d2e-848d-6c7fc0880672
Contact Form Builder by Bit Form <= 2.1.0 – Authenticated (Admin+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3645
CVSS Score: 4.4 (Medium)
Researcher/s: Dipak Panchal
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9cb6384a-f9dc-454c-be39-c2c681e57d36
Web Accessibility By accessiBe <= 1.15 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9d79ce22-33ef-4dfb-a842-591cd7cedc94
wp tell a friend popup form <= 7.1 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-25465
CVSS Score: 4.4 (Medium)
Researcher/s: yuyudhn
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ec860ad9-7054-4ed2-a8f2-6589e4db36cd
Bit Assist <= 1.1.8 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3667
CVSS Score: 4.4 (Medium)
Researcher/s: Dipak Panchal
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/fb88e629-6811-4651-99b9-7394e4a787b6
Remove Duplicate Posts <= 1.3.4 – Missing Authorization to Post Deletion
CVE ID: CVE-2023-29237
CVSS Score: 4.3 (Medium)
Researcher/s: Junsu Yeo
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/02dcf609-e8ef-4ff5-a61e-6c513af04ca2
Donations Made Easy – Smart Donations <= 4.0.12 – Missing Authorization
CVE ID: CVE-2023-38475
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0efebdcb-c3fb-435a-8687-6abdd5f9334b
Woocommerce Category Banner Management <= 2.4.1 – Cross-Site Request Forgery
CVE ID: CVE-2023-39158
CVSS Score: 4.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/223a6c35-712a-458c-8708-6981c9041fe1
Simple Author Box <= 2.51 – Authenticated (Contributor+) Insecure Direct Object Reference to Arbitrary User Sensitive Information Exposure
CVE ID: CVE-2023-3601
CVSS Score: 4.3 (Medium)
Researcher/s: Dmitriy
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2a1b7e37-1e30-473c-aadc-176de729e619
Mobile Address Bar Changer <= 3.0 – Cross-Site Request Forgery to Settings Update
CVE ID: CVE-2023-38390
CVSS Score: 4.3 (Medium)
Researcher/s: Skalucy
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2f1b0b50-663f-40ff-803e-a20d7c7ea980
Meks Smart Social Widget <= 1.6 – Cross-Site Request Forgery via meks_remove_notification
CVE ID: CVE-2023-25989
CVSS Score: 4.3 (Medium)
Researcher/s: Muhammad Daffa
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b
Simple Wp Sitemap <= 1.2.1 – Cross-Site Request Forgery
CVE ID: CVE-2023-24380
CVSS Score: 4.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3e3dc509-73c3-4869-b520-6f5c1d691184
Optimize Database after Deleting Revisions <= 5.0.110 – Cross-Site Request Forgery via ‘odb_start_manually’
CVE ID: CVE-2023-25980
CVSS Score: 4.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5d01548e-91bf-44db-83dc-10c7d5962f9b
Perelink Pro <= 2.1.4 – Cross-Site Request Forgery to Settings Update
CVE ID: CVE-2023-37990
CVSS Score: 4.3 (Medium)
Researcher/s: Skalucy
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/65b9fea3-323a-4123-ad83-3d713eb5552f
ACF Photo Gallery Field <= 1.9 – Authenticated (Subscriber+) Arbitrary Usermeta Update
CVE ID: CVE-2023-3957
CVSS Score: 4.3 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/689511e0-1355-4fcb-8a72-d819abc8e9a3
QR code MeCard/vCard generator <= 1.6.0 – Missing Authorization via wqm_make_url_permanent
CVE ID: CVE-2023-38477
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/8896fa5a-1642-4fcd-8fff-1e5828c28523
Taboola <= 2.0.1 – Cross-Site Request Forgery to Plugin Settings Update
CVE ID: CVE-2023-38398
CVSS Score: 4.3 (Medium)
Researcher/s: Nguyen Xuan Chien
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ab015cb4-0b1e-40ff-ab9b-6c03eed3142f
Inisev Plugins (Various Versions) – Cross-Site Request Forgery on handle_installation function
CVE ID: CVE-2023-3977
CVSS Score: 4.3 (Medium)
Researcher/s: Chloe Chamberland
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc
Simple Googlebot Visit <= 1.2.4 – Missing Authorization to Settings Update
CVE ID: CVE-2023-38479
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b1e7bb04-28b4-407c-910b-e37a7e26682e
Post to Google My Business <= 3.1.14 – Cross-Site Request Forgery to Dismiss Notification
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/baa8e48f-769a-4f48-bc47-d55c179d1ca1
The Events Calendar <= 6.1.2.2 – Missing Authorization
CVE ID: CVE-2023-35777
CVSS Score: 4.3 (Medium)
Researcher/s: PetiteMais
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c513e674-c027-4335-8ba3-b19696a1ce9b
Inisev Plugins (Various Versions) – Missing Authorization on handle_installation function
CVE ID: CVE-2023-0958
CVSS Score: 4.3 (Medium)
Researcher/s: Chloe Chamberland
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3
CartFlows Pro <= 1.11.12 – Cross-Site Request Forgery
CVE ID: CVE-2023-36685
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d0631ec9-fb72-4573-a41b-9b6b01aeaae9
Ninja Forms <= 3.6.25 – Missing Authorization to Form Submission Export
CVE ID: CVE-2023-38393
CVSS Score: 4.3 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d7befdf6-07d7-42c9-876a-abb8f8f9c3df
Google Map Shortcode <= 3.1.2 – Cross-Site Request Forgery to Plugin Setting Update
CVE ID: CVE-2023-38396
CVSS Score: 4.3 (Medium)
Researcher/s: thiennv
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e3f05af5-35f5-4813-b8a3-bb90709af677
Update Theme and Plugins from Zip File <= 2.0.0 – Cross-Site Request Forgery
CVE ID: CVE-2023-25489
CVSS Score: 4.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e59293a6-cc61-4913-9ed0-13fa16299705
Woocommerce Blocker Lite <= 2.1.4.1 – Cross-Site Request Forgery
CVE ID: CVE-2023-39159
CVSS Score: 4.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f4f84b2a-2674-42a1-9db1-d9c1f3db2376
Local Development <=2.8.2 – Cross-Site Request Forgery to Settings Update
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f962a3ef-205d-42e2-acf1-45eabfdba3ee
WPS Limit Login <= 1.5.6 – Race Condition
CVE ID: CVE-2023-39160
CVSS Score: 3.7 (Low)
Researcher/s: konagash
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/298b31e4-739e-424e-918f-77092148a6bb
Video Conferencing with Zoom <= 4.2.1 – Sensitive Information Exposure
CVE ID: CVE-2023-3947
CVSS Score: 3.7 (Low)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ba2515d9-ced0-4b49-87c4-04c8391c2608
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (July 24, 2023 to July 30, 2023) appeared first on Wordfence.