Did you know we’re running a Bug Bounty Extravaganza again?
Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure!
Last week, there were 107 vulnerabilities disclosed in 82 WordPress Plugins and 8 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 42 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 16,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
WAF-RULE-700 – Data redacted while we work with the vendor on a patch.
WAF-RULE-699 – Data redacted while we work with the vendor on a patch.
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status
Number of Vulnerabilities
Patched
96
Unpatched
11
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating
Number of Vulnerabilities
Medium Severity
86
High Severity
14
Critical Severity
7
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE
Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
61
Missing Authorization
17
Cross-Site Request Forgery (CSRF)
7
Deserialization of Untrusted Data
3
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
3
Unrestricted Upload of File with Dangerous Type
3
Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
2
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
2
Authentication Bypass Using an Alternate Path or Channel
1
Authorization Bypass Through User-Controlled Key
1
Improper Access Control
1
Improper Authorization
1
Improper Control of Generation of Code (‘Code Injection’)
1
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
1
Information Exposure
1
Server-Side Request Forgery (SSRF)
1
URL Redirection to Untrusted Site (‘Open Redirect’)
1
Researchers That Contributed to WordPress Security Last Week
Researcher Name
Number of Vulnerabilities
12
8
8
7
6
4
4
4
3
3
3
3
3
3
3
3
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name
Software Slug
140+ Widgets | Best Addons For Elementor – FREE
xpro-elementor-addons
All-in-One Video Gallery
all-in-one-video-gallery
Alt Text AI – Automatically generate image alt text for SEO and accessibility
alttext-ai
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
simply-schedule-appointments
Borderless – Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg
borderless
Build App Online
build-app-online
Builder for WooCommerce product reviews shortcodes – ReviewShort
woo-product-reviews-shortcode
Bulk Posts Editing For WordPress
ithemeland-bulk-posts-editing-lite
Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder
fluentform
Contact Form Widget – Contact Query, Contact Page, Form Maker, Query Table
new-contact-form-widget
ConvertPlus
convertplug
Copymatic – AI Content Writer & Generator
copymatic
Cost Calculator Builder PRO
cost-calculator-builder-pro
Custom Post Type Attachment
custom-post-type-pdf-attachment
DethemeKit For Elementor
dethemekit-for-elementor
Elegant Blocks – Amazing Gutenberg Blocks
elegant-blocks
Elementor Header & Footer Builder
header-footer-elementor
Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce
email-subscribers
Envo Extra
envo-extra
Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders
essential-addons-for-elementor-lite
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates
essential-blocks
Exclusive Addons for Elementor
exclusive-addons-for-elementor
Fast Custom Social Share by CodeBard
fast-custom-social-share-by-codebard
Fastly
fastly
FundEngine – Donation and Crowdfunding Platform
wp-fundraising-donation
GiveWP – Donation Plugin and Fundraising Platform
give
Gutenberg Blocks with AI by Kadence WP – Page Builder Features
kadence-blocks
Happy Addons for Elementor
happy-elementor-addons
iframe
iframe
Image Optimization by Optimole – Lazy Load, CDN, Convert WebP & AVIF
optimole-wp
ImageMagick Sharpen Resized Images
imagemagick-sharpen-resized-images
Import and export users and customers
import-users-from-csv-with-meta
Insert or Embed Articulate Content into WordPress
insert-or-embed-articulate-content-into-wordpress
Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms
cf7-hubspot
Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms
cf7-salesforce
JCH Optimize
jch-optimize
Jetpack – WP Security, Backup, Speed, & Growth
jetpack
Kognetiks Chatbot for WordPress
chatbot-chatgpt
Landing Page Builder – Coming Soon page, Maintenance Mode, Lead Page, WordPress Landing Pages
page-builder-add
Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider WordPress Plugin
logo-slider-wp
Magazine Blocks – Blog Designer, Magazine & Newspaper Website Builder, Page Builder with Posts Blocks, Post Grid
magazine-blocks
Master Addons – Free Widgets, Hover Effects, Toggle, Conditions, Animations for Elementor
master-addons
Mega Elements – Addons for Elementor
mega-elements-addons-for-elementor
Menu Icons by ThemeIsle
menu-icons
Order Export & Order Import for WooCommerce
order-import-export-for-woocommerce
Password Protected – Ultimate Plugin to Protect WordPress Site, Pages & WooCommerce Store
password-protected
Penci Soledad Data Migrator
penci-data-migrator
Picture Gallery – Frontend Image Uploads, AJAX Photo List
picture-gallery
Piotnet Addons For Elementor
piotnet-addons-for-elementor
Popup Builder
easy-notify-lite
Popup Maker – Responsive popup, Exit Intent Pop up, Email Optins, Autoresponder & More
popup-maker-wp
Popup – Popup More Popups
popup-more
Post and Page Builder by BoldGrid – Visual Drag and Drop Editor
post-and-page-builder
Post Grid Elementor Addon
post-grid-elementor-addon
Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress
radio-player
Rank Math SEO with AI Best SEO Tools
seo-by-rank-math
ReviewX – Multi-criteria Rating & Reviews for WooCommerce
reviewx
Royal Elementor Addons and Templates
royal-elementor-addons
RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging
wp-rss-aggregator
Salon booking system
salon-booking-system
ShiftController Employee Shift Scheduling
shiftcontroller
ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor)
woolentor-addons
Simple Basic Contact Form
simple-basic-contact-form
Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates)
sina-extension-for-elementor
Swift Framework
socialdriver-framework
Sydney Toolbox
sydney-toolbox
Tagembed: Embed Twitter Feed, Google Reviews, YouTube Videos, TikTok, RSS Feed & More Social Media Feeds
tagembed-widget
Testimonial Carousel For Elementor
testimonials-carousel-elementor
Tutor LMS Pro
tutor-pro
Tutor LMS – eLearning and online course solution
tutor
Visual Portfolio, Photo Gallery & Post Grid
visual-portfolio
Visualizer: Tables and Charts Manager for WordPress
visualizer
weMail – Email Marketing, Newsletter, Optin Forms, Subscribers WordPress Plugin
wemail
WordPress Automatic Plugin
wp-automatic
WP Backpack
wp-backpack
WP Compress – Image Optimizer [All-In-One]
wp-compress-image-optimizer
WP SMS – Messaging, SMS & MMS Notifications, 2FA & OTP for WordPress, WooCommerce, GravityForms, etc
wp-sms
WP Stacker
wp-stacker
WPB Elementor Addons
wpb-elementor-addons
WPZOOM Addons for Elementor (Templates, Widgets)
wpzoom-elementor-addons
YITH WooCommerce Gift Cards
yith-woocommerce-gift-cards
Yoast SEO
wordpress-seo
WordPress Themes with Reported Vulnerabilities Last Week
Software Name
Software Slug
ChaosTheory
chaostheory
Consus
consus
EmpowerWP
empowerwp
Ketos
ketos
Niveau
niveau
Oasis
oasis
Skyline WP
skyline-wp
Zeka
zeka
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.
CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-32700
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-3658
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-2771
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-31351
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-3551
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-4223
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Critical (9.1)
CVE-ID
CVE-2024-4442
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4670
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4847
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4010
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-0757
Patch Status
Unpatched
Published
May 14, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4318
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4351
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-4352
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-3750
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-2782
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-4838
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-4733
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-4222
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-4709
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-34751
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-4144
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-4279
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-4445
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4440
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4288
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4666
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34757
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34766
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2772
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4789
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4546
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34575
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4374
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34769
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4634
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4385
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4624
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34764
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4891
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4618
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3714
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4057
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4208
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4478
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-5088
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4865
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4391
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34805
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4636
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-0756
Patch Status
Unpatched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4392
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3288
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34760
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4580
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-3134
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4702
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4635
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34759
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4432
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34567
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34770
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4400
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34789
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4617
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34767
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4333
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4373
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-2697
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4473
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4698
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4363
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4849
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-34791
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4370
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-4984
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-34752
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-4860
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-5003
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-3189
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-3887
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-34763
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-34754
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-34753
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-34822
Patch Status
Patched
Published
May 15, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-34758
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-0870
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (5.0)
CVE-ID
CVE-2024-2619
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-34790
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4734
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4656
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-32800
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-4756
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-34811
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4199
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-4204
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34809
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34810
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34807
Patch Status
Unpatched
Published
May 13, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34768
Patch Status
Patched
Published
May 17, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34755
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34756
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34808
Patch Status
Patched
Published
May 13, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-0437
Patch Status
Patched
Published
May 14, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-3609
Patch Status
Patched
Published
May 16, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-34804
Patch Status
Unpatched
Published
May 17, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2023-6812
Patch Status
Patched
Published
May 13, 2024
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (May 13, 2024 to May 19, 2024) appeared first on Wordfence.