Lucene search

K
wordfenceChloe ChamberlandWORDFENCE:0B8DEC394959171B93D4783B20B228DB
HistorySep 26, 2024 - 2:56 p.m.

Wordfence Intelligence Weekly WordPress Vulnerability Report (September 16, 2024 to September 22, 2024)

2024-09-2614:56:03
Chloe Chamberland
www.wordfence.com
4

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High


📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors?Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, r__esearchers can earnup to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.


Last week, there were 26 vulnerabilities disclosed in 21 WordPress Plugins and 3 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 19 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

  • WAF-RULE-744 - Data redacted while we work with the vendor on a patch.
  • WAF-RULE-742 - Data redacted while we work with the vendor on a patch.
  • WAF-RULE-741 - Data redacted while we work with the vendor on a patch.

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Patched 13
Unpatched 13

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Medium Severity 20
High Severity 5
Critical Severity 1

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 12
Cross-Site Request Forgery (CSRF) 5
Use of Less Trusted Source 2
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') 1
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) 1
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 1
Improper Privilege Management 1
Incorrect Regular Expression 1
Missing Authorization 1
URL Redirection to Untrusted Site ('Open Redirect') 1

Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities

stealthcopter

| 3

Bob Matyas

| 2

Krzysztof Zając

| 2

Le Ngoc Anh

| 2

João Pedro Soares de Alcântara

| 2

Daniel Ruf

| 2

João G. Barbosa (4rCanJ0x!)

| 1

Zitec/Teodora Jilaveanu

| 1

LVT-tholv2k

| 1

wesley (wcraft)

| 1

kauenavarro

| 1

Felipe Caon

| 1

Rafie Muhammad

| 1

Michael

| 1

Jorge Diaz (ddiax)

| 1

rezaduty

| 1

István Márton

| 1

Hoa Le Ngoc (lengochoa)

| 1

Dimas Maulana

| 1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Backup Database backup-database
GDPR Cookie Consent webtoffee-gdpr-cookie-consent
Greenshift – animation and page builder blocks greenshift-animation-and-page-builder-blocks
Gutenberg Blocks – Unlimited blocks For Gutenberg unlimited-blocks
IMPress for IDX Broker idx-broker-platinum
Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix limit-login-attempts-plus
Maintenance Redirect jf3-maintenance-mode
MC4WP: Mailchimp for WordPress mailchimp-for-wp
PeoplePond peoplepond
Product Carousel Slider & Grid Ultimate for WooCommerce woo-product-carousel-slider-and-grid-ultimate
PropertyHive propertyhive
Share This Image share-this-image
Simple Nav Archives simple-nav-archives
SKT Templates – 100% free Elementor & Gutenberg templates skt-templates
Spice Starter Sites spice-starter-sites
Team Showcase team
Webo-facto webo-facto-connector
WooCommerce Multilingual & Multicurrency with WPML woocommerce-multilingual
WP Custom Fields Search wp-custom-fields-search
WP Hardening (discontinued) wp-security-hardening
WPCargo Track & Trace wpcargo

WordPress Themes with Reported Vulnerabilities Last Week

Software Name Software Slug
Roseta roseta
Septera septera
Verbosa verbosa

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you'd like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

Webo-facto <= 1.40 - Unauthenticated Privilege Escalation

9.8

CVSS Rating
Critical (9.8)

CVE-ID
CVE-2024-8853

Patch Status
Patched

Published
Sep 17, 2024

Affected Software
Webo-facto

Researcher

István Márton

More Details >

Product Carousel Slider & Grid Ultimate for WooCommerce <= 1.9.10 - Authenticated (Contributor+) Local File Inclusion

8.8

CVSS Rating
High (8.8)

CVE-ID
CVE-2024-44048

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Product Carousel Slider & Grid Ultimate for WooCommerce

Researcher

João Pedro Soares de Alcântara

More Details >

PropertyHive <= 2.0.19 - Cross-Site Request Forgery via save_account_details

8.8

CVSS Rating
High (8.8)

CVE-ID
CVE-2024-8490

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
PropertyHive

Researcher

wesley (wcraft)

More Details >

WPCargo Track & Trace <= 7.0.6 - Unauthenticated SQL Injection

7.5

CVSS Rating
High (7.5)

CVE-ID
CVE-2024-44004

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
WPCargo Track & Trace

Researcher

LVT-tholv2k

More Details >

GDPR Cookie Consent <= 2.6.0 - Unauthenticated Stored Cross-Site Scripting

7.2

CVSS Rating
High (7.2)

CVE-ID
CVE-2024-8397

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
GDPR Cookie Consent

Researcher

Zitec/Teodora Jilaveanu

More Details >

Share This Image <= 2.03 - Open Redirect via link Parameter

7.2

CVSS Rating
High (7.2)

CVE-ID
CVE-2024-8761

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
Share This Image

Researcher

Krzysztof Zając

More Details >

Greenshift – animation and page builder blocks <= 9.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-44005

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
Greenshift – animation and page builder blocks

Researcher

João Pedro Soares de Alcântara

More Details >

Gutenberg Blocks – Unlimited blocks For Gutenberg <= 1.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-44049

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Gutenberg Blocks – Unlimited blocks For Gutenberg

Researcher

João G. Barbosa (4rCanJ0x!)

More Details >

IMPress for IDX Broker <= 3.2.2 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-44047

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
IMPress for IDX Broker

Researcher

Michael

More Details >

Roseta <= 1.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-45451

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Roseta

Researcher

stealthcopter

More Details >

Septera <= 1.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-45452

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Septera

Researcher

stealthcopter

More Details >

Verbosa <= 1.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-44050

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
Verbosa

Researcher

stealthcopter

More Details >

WP Custom Fields Search <= 1.2.35 - Authenticated (Contributor+) Stored Cross-Site Scripting via wpcfs-preset Shortcode

6.4

CVSS Rating
Medium (6.4)

CVE-ID
CVE-2024-8364

Patch Status
Unpatched

Published
Sep 18, 2024

Affected Software
WP Custom Fields Search

Researcher

Krzysztof Zając

More Details >

MC4WP: Mailchimp for WordPress 4.9.9 - 4.9.16 - Reflected Cross-Site Scripting

6.1

CVSS Rating
Medium (6.1)

CVE-ID
CVE-2024-8850

Patch Status
Patched

Published
Sep 18, 2024

Affected Software
MC4WP: Mailchimp for WordPress

Researcher

kauenavarro

More Details >

PeoplePond <= 1.1.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting

6.1

CVSS Rating
Medium (6.1)

CVE-ID
CVE-2024-8085

Patch Status
Unpatched

Published
Sep 20, 2024

Affected Software
PeoplePond

Researcher

Daniel Ruf

More Details >

SKT Templates – Elementor & Gutenberg templates <= 6.14 - Reflected Cross-Site Scripting

6.1

CVSS Rating
Medium (6.1)

CVE-ID
CVE-2024-44007

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
SKT Templates – 100% free Elementor & Gutenberg templates

Researcher

Dimas Maulana

More Details >

Spice Starter Sites <= 1.2.5 - Reflected Cross-Site Scripting

6.1

CVSS Rating
Medium (6.1)

CVE-ID
CVE-2024-44003

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Spice Starter Sites

Researcher

Le Ngoc Anh

More Details >

Team Showcase <= 1.22.25 - Reflected Cross-Site Scripting

6.1

CVSS Rating
Medium (6.1)

CVE-ID
CVE-2024-44002

Patch Status
Unpatched

Published
Sep 16, 2024

Affected Software
Team Showcase

Researcher

Le Ngoc Anh

More Details >

Limit Login Attempts Plus <= 1.1.0 - IP Address Spoofing to Protection Mechanism Bypass

5.3

CVSS Rating
Medium (5.3)

CVE-ID
CVE-2022-4533

Patch Status
Unpatched

Published
Sep 18, 2024

Affected Software
Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix

Researcher

rezaduty

More Details >

Maintenance Redirect <= 2.0.1 - IP Spoofing to Maintenance Mode Bypass

5.3

CVSS Rating
Medium (5.3)

CVE-ID
CVE-2024-45453

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
Maintenance Redirect

Researcher

Hoa Le Ngoc (lengochoa)

More Details >

WP Hardening – Fix Your WordPress Security <= 1.2.6 - Unauthenticated Security Feature Bypass to Username Enumeration

5.3

CVSS Rating
Medium (5.3)

CVE-ID
CVE-2024-6641

Patch Status
Patched

Published
Sep 17, 2024

Affected Software
WP Hardening (discontinued)

Researcher

Felipe Caon

More Details >

Backup Database <= 4.9 - Authenticated (Admin+) Stored Cross-Site Scripting

4.4

CVSS Rating
Medium (4.4)

CVE-ID
CVE-2024-8702

Patch Status
Unpatched

Published
Sep 20, 2024

Affected Software
Backup Database

Researcher

Bob Matyas

More Details >

MailChimp for Wordpress <= 4.9.16 - Authenticated (Administrator+) Stored Cross-Site Scripting

4.4

CVSS Rating
Medium (4.4)

CVE-ID
CVE-2024-8680

Patch Status
Patched

Published
Sep 20, 2024

Affected Software
MC4WP: Mailchimp for WordPress

Researcher

Jorge Diaz (ddiax)

More Details >

GDPR Cookie Consent <= 2.6.0 - Cross-Site Request Forgery to Bulk Delete

4.3

CVSS Rating
Medium (4.3)

CVE-ID
CVE-2024-8286

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
GDPR Cookie Consent

Researcher

Bob Matyas

More Details >

Simple Nav Archives <= 2.1.3 - Cross-Site Request Forgery to Settings Update

4.3

CVSS Rating
Medium (4.3)

CVE-ID
CVE-2024-8398

Patch Status
Unpatched

Published
Sep 20, 2024

Affected Software
Simple Nav Archives

Researcher

Daniel Ruf

More Details >

WooCommerce Multilingual & Multicurrency <= 5.3.6 - Missing Authorization

4.3

CVSS Rating
Medium (4.3)

CVE-ID
CVE-2024-44006

Patch Status
Patched

Published
Sep 16, 2024

Affected Software
WooCommerce Multilingual & Multicurrency with WPML

Researcher

Rafie Muhammad

More Details >


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (September 16, 2024 to September 22, 2024) appeared first on Wordfence.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

Related for WORDFENCE:0B8DEC394959171B93D4783B20B228DB