9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
75.6%
Last week, there were 61 vulnerabilities disclosed in 54 WordPress Plugins and 1 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 28 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
_Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Patch Status | Number of Vulnerabilities |
---|---|
Unpatched | 29 |
Patched | 32 |
Severity Rating | Number of Vulnerabilities |
---|---|
Low Severity | 0 |
Medium Severity | 49 |
High Severity | 8 |
Critical Severity | 4 |
Vulnerability Type by CWE | Number of Vulnerabilities |
---|---|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 24 |
Cross-Site Request Forgery (CSRF) | 14 |
Missing Authorization | 14 |
Authorization Bypass Through User-Controlled Key | 4 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 2 |
Information Exposure | 1 |
Uncontrolled Resource Consumption ('Resource Exhaustion') | 1 |
Unrestricted Upload of File with Dangerous Type | 1 |
Researcher Name | Number of Vulnerabilities |
---|---|
Alex Thomas | |
(Wordfence Vulnerability Researcher) | 9 |
LEE SE HYOUNG | 6 |
Abdi Pranata | 6 |
Lana Codes | |
(Wordfence Vulnerability Researcher) | 3 |
Rafie Muhammad | 3 |
yuyudhn | 3 |
Rio Darmawan | 2 |
Muhammad Daffa | 2 |
Elliot | 1 |
Rafael B. | 1 |
Bob Matyas | 1 |
Kijam López | 1 |
easyBug | 1 |
Alex Sanford | 1 |
Dipak Panchal | 1 |
Yassir Sbai Fahim | 1 |
Rafi Priatna Kasbiantoro | 1 |
Pavitra Tiwari | 1 |
Nguyen Anh Tien | 1 |
Nithissh S | 1 |
Friday | 1 |
Dave Jong | 1 |
PetiteMais | 1 |
Yuki Haruma | 1 |
Le Ngoc Anh | 1 |
thiennv | 1 |
TaeEun Lee | 1 |
Paolo Elia | 1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
Software Name | Software Slug |
---|---|
ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup | armember-membership |
All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs – My Sticky Elements | mystickyelements |
Animated Number Counters | animated-number-counters |
Auto Location for WP Job Manager via Google | auto-location-for-wp-job-manager |
BadgeOS | badgeos |
Baidu Tongji generator | baidu-tongji-generator |
Booking Package | booking-package |
Bulk edit image alt tag, caption & description – WordPress Media Library Helper by Codexin | media-library-helper |
Classified Listing – Classified ads & Business Directory Plugin | classified-listing |
Coming Soon Page – Responsive Coming Soon & Maintenance Mode | responsive-coming-soon-page |
Cryptocurrency Widgets – Price Ticker & Coins List | cryptocurrency-price-ticker-widget |
FluentSMTP – WP Mail SMTP, Amazon SES, SendGrid, MailGun and Any SMTP Connector Plugin | fluent-smtp |
Getnet Argentina para Woocommerce | integrar-getnet-con-woo |
Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) | gift-voucher |
HT Mega – Absolute Addons For Elementor | ht-mega-for-elementor |
Header Footer Code Manager | header-footer-code-manager |
Image Regenerate & Select Crop | image-regenerate-select-crop |
Image Social Feed Plugin | add-instagram |
Kingkong Board | kingkong-board |
LMS by Masteriyo – WordPress Learning Management System, eLearning Platform, Online Education System & Online Course Builder | learning-management-system |
LearnPress – WordPress LMS Plugin | learnpress |
Livestream Notice | livestream-notice |
Menubar | menubar |
Mobile Call Now & Map Buttons | mobile-call-now-map-buttons |
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress | ninja-forms |
Product Category Tree | product-category-tree |
Querlo Chatbot | querlo-chatbots |
RSVPMaker | rsvpmaker |
Reservation.Studio widget | reservation-studio-widget |
SMTP Mail | smtp-mail |
Secondary Title | secondary-title |
ShopLentor – WooCommerce Builder for Elementor & Gutenberg +10 Modules – All in One Solution (formerly WooLentor) | woolentor-addons |
Simple Giveaways – Grow your business, email lists and traffic with contests | giveasap |
Simple Light Weight Social Share (Tweet, Like, Share and Linkedin) | only-tweet-like-share-and-google-1 |
Simple Site Verify | simple-site-verify |
Social Share Boost | social-share-boost |
SrbTransLatin – Serbian Latinisation | srbtranslatin |
Sublanguage | sublanguage |
User Registration – Custom Registration Form, Login Form And User Profile For WordPress | user-registration |
Video Gallery – YouTube Playlist, Channel Gallery by YotuWP | yotuwp-easy-youtube-embed |
Visibility Logic for Elementor | visibility-logic-elementor |
Visual Website Collaboration, Feedback & Project Management – Atarim | atarim-visual-collaboration |
WP Content Copy Protection & No Right Click | wp-content-copy-protector |
WP Dummy Content Generator | wp-dummy-content-generator |
WP Full Stripe Free | wp-full-stripe-free |
WP Mail Log | wp-mail-log |
WP RSS Images | wp-rss-images |
WP Reroute Email | wp-reroute-email |
WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc | wp-sms |
WP-Cirrus | wp-cirrus |
WP-Optimize – Cache, Clean, Compress. | wp-optimize |
WordPress Mobile Pack – Mobile Plugin for Progressive Web Apps & Hybrid Mobile Apps | wordpress-mobile-pack |
oAuth Twitter Feed for Developers | oauth-twitter-feed-for-developers |
wpForo Forum | wpforo |
Software Name | Software Slug |
---|---|
WPLMS Learning Management System for WordPress, WordPress LMS | [wplms](<https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/WPLMS Learning Management System for WordPress, WordPress LMS>) |
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
Affected Software: User Registration – Custom Registration Form, Login Form And User Profile For WordPress CVE ID: CVE-2023-3342 CVSS Score: 9.9 (Critical) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a979e885-f7dd-4616-a881-64f3d97c309d>
Affected Software: HT Mega – Absolute Addons For Elementor CVE ID: CVE Unknown CVSS Score: 9.8 (Critical) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/46f3cc62-c2d8-45af-bb92-c2040789cbc0>
Affected Software: Booking Package CVE ID: CVE-2023-37389 CVSS Score: 9.8 (Critical) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/65166432-a877-4070-94c1-cdaf7e5d7586>
Affected Software: Visual Website Collaboration, Feedback & Project Management – Atarim CVE ID: CVE Unknown CVSS Score: 9.1 (Critical) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/15f3a6e1-6126-4825-b2b1-e40dc5694f43>
Affected Software: Getnet Argentina para Woocommerce CVE ID: CVE-2023-3525 CVSS Score: 7.5 (High) Researcher/s: Kijam López Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19>
Affected Software: LearnPress – WordPress LMS Plugin CVE ID: CVE-2023-36515 CVSS Score: 7.3 (High) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ea136a60-aa42-4577-88b6-a49c79098954>
Affected Software: WP Reroute Email CVE ID: CVE-2023-3168 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895>
Affected Software: RSVPMaker CVE ID: CVE-2023-29095 CVSS Score: 7.2 (High) Researcher/s: Rafi Priatna Kasbiantoro Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6709f9b0-0915-4361-9fb0-1f2696e26c2f>
Affected Software: WP Mail Log CVE ID: CVE-2023-3088 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/86ee1acb-6f0c-40e6-80a0-fc93b61c1602>
Affected Software: SMTP Mail CVE ID: CVE-2023-3092 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/8ae734d1-0cd4-4ff5-8448-828b0fb64f70>
Affected Software: Coming Soon Page – Responsive Coming Soon & Maintenance Mode CVE ID: CVE-2022-46849 CVSS Score: 7.2 (High) Researcher/s: Le Ngoc Anh Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9a371489-031e-483e-9fde-3901b55710c6>
Affected Software: FluentSMTP – WP Mail SMTP, Amazon SES, SendGrid, MailGun and Any SMTP Connector Plugin CVE ID: CVE-2023-3087 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/fa47a794-e5ce-491d-a10b-c7c5718aa853>
Affected Software: ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup CVE ID: CVE-2023-3011 CVSS Score: 6.5 (Medium) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/42f5f29b-2d83-4b15-82aa-0598f8a2317b>
Affected Software: LMS by Masteriyo – WordPress Learning Management System, eLearning Platform, Online Education System & Online Course Builder CVE ID: CVE-2023-3345 CVSS Score: 6.5 (Medium) Researcher/s: Yassir Sbai Fahim Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5e8933b8-1e09-4cd7-8206-711cc0716dba>
Affected Software: Simple Giveaways – Grow your business, email lists and traffic with contests CVE ID: CVE-2023-23893 CVSS Score: 6.5 (Medium) Researcher/s: Nguyen Anh Tien Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/721f8943-5d59-41ee-935e-999dff2e590d>
Affected Software: BadgeOS CVE ID: CVE-2023-2173 CVSS Score: 6.5 (Medium) Researcher/s: Alex Thomas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ebb9e37c-9e8b-429b-b4ef-cd875351852c>
Affected Software: Querlo Chatbot CVE ID: CVE-2023-3418 CVSS Score: 6.4 (Medium) Researcher/s: Rafael B. Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/157ea849-7947-4d0d-9ecf-7705f9039c8d>
Affected Software: Secondary Title CVE ID: CVE-2023-28773 CVSS Score: 6.4 (Medium) Researcher/s: TaeEun Lee Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f5ab7d3e-b0c8-4e30-942b-23d91daff2ac>
Affected Software: WPLMS Learning Management System for WordPress, WordPress LMS CVE ID: CVE-2023-36690 CVSS Score: 6.3 (Medium) Researcher/s: Dave Jong Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9071acdf-8d40-4e8b-8d1f-be2cabf3d66e>
Affected Software: Kingkong Board CVE ID: CVE-2023-36694 CVSS Score: 6.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d7b33199-d254-4d0c-88d0-ad2f7515d747>
Affected Software: wpForo Forum CVE ID: CVE-2023-2309 CVSS Score: 6.1 (Medium) Researcher/s: Alex Sanford Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/35b6a26a-d7c1-4538-87f3-fcb1095797a3>
Affected Software/s: SrbTransLatin – Serbian Latinisation, WP-Optimize – Cache, Clean, Compress. CVE ID: CVE-2023-1119 CVSS Score: 6.1 (Medium) Researcher/s: Paolo Elia Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/fdb822e8-583e-4437-a735-b116aa8886e2>
Affected Software: Animated Number Counters CVE ID: CVE-2023-24393 CVSS Score: 5.5 (Medium) Researcher/s: yuyudhn Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e87ea6b5-4288-4ebb-8a29-e0a179e6b584>
Affected Software: WordPress Mobile Pack – Mobile Plugin for Progressive Web Apps & Hybrid Mobile Apps CVE ID: CVE-2023-37391 CVSS Score: 5.4 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1f545c20-5be1-42bc-9268-640590ee4bf2>
Affected Software: LearnPress – WordPress LMS Plugin CVE ID: CVE Unknown CVSS Score: 5.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/389277fd-e47e-42df-9305-61ceedbcfb29>
Affected Software: Sublanguage CVE ID: CVE-2023-36695 CVSS Score: 5.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/50726c57-8d42-4143-9e75-d30513d8d0e2>
Affected Software: Header Footer Code Manager CVE ID: CVE Unknown CVSS Score: 5.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/60493635-b1b0-4e76-8f73-16c223d7b4d7>
Affected Software: BadgeOS CVE ID: CVE-2023-2171 CVSS Score: 5.4 (Medium) Researcher/s: Alex Thomas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/74a280e1-e4b6-4bd9-882b-d9f185332d61>
Affected Software: Menubar CVE ID: CVE-2023-36687 CVSS Score: 5.4 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/be10894d-2a86-4f07-8119-e6eac8c9c950>
Affected Software: Image Regenerate & Select Crop CVE ID: CVE-2023-36680 CVSS Score: 5.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cb7335c0-b6ed-43bb-91b7-870093d14cb8>
Affected Software: LearnPress – WordPress LMS Plugin CVE ID: CVE-2023-36516 CVSS Score: 5.4 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e91e864a-20f6-48a2-ab9f-d20836207383>
Affected Software: Product Category Tree CVE ID: CVE-2023-29173 CVSS Score: 5.3 (Medium) Researcher/s: Friday Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/88840d66-1644-4af0-b811-41f0e9fe2c0c>
Affected Software: Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress CVE ID: CVE-2023-35909 CVSS Score: 5.3 (Medium) Researcher/s: PetiteMais Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/952a3e52-4e23-4bc4-92d3-e15ae2f3d28b>
Affected Software: Cryptocurrency Widgets – Price Ticker & Coins List CVE ID: CVE-2023-36681 CVSS Score: 5.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dec2855c-71a8-46b2-819a-d85cd11a1a24>
Affected Software: WP Dummy Content Generator CVE ID: CVE-2023-37394 CVSS Score: 5.3 (Medium) Researcher/s: thiennv Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f4dad030-41e4-4d67-8650-8d268c44d352>
Affected Software: Auto Location for WP Job Manager via Google CVE ID: CVE-2023-3344 CVSS Score: 4.4 (Medium) Researcher/s: Bob Matyas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/19a70aa0-7075-4922-8feb-25b7fbe9da42>
Affected Software: WP Full Stripe Free CVE ID: CVE-2023-28934 CVSS Score: 4.4 (Medium) Researcher/s: easyBug Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2afbc0a4-32ad-4fc4-9b10-5c06784f72f3>
Affected Software: Social Share Boost CVE ID: CVE-2023-25044 CVSS Score: 4.4 (Medium) Researcher/s: Rio Darmawan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/41d09e93-8503-41e8-85d3-8550dc8f85bd>
Affected Software: WP-Cirrus CVE ID: CVE-2023-36692 CVSS Score: 4.4 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4cab3c9c-39c6-4279-9573-858b0592c3fa>
Affected Software: All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs – My Sticky Elements CVE ID: CVE-2023-3248 CVSS Score: 4.4 (Medium) Researcher/s: Dipak Panchal Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/52538617-a1d1-40ed-8321-e39d06869398>
Affected Software: Livestream Notice CVE ID: CVE-2023-27621 CVSS Score: 4.4 (Medium) Researcher/s: Pavitra Tiwari Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/69d957d3-a0d5-44ec-a9b0-8c9b41175379>
Affected Software: Reservation.Studio widget CVE ID: CVE-2023-24397 CVSS Score: 4.4 (Medium) Researcher/s: Nithissh S Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/7caa4c73-cf57-4f99-8bc6-6fd02308a58f>
Affected Software: Video Gallery – YouTube Playlist, Channel Gallery by YotuWP CVE ID: CVE-2023-25477 CVSS Score: 4.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/93b5bc57-3bfa-4477-a9d4-f0563008cf94>
Affected Software: WP Content Copy Protection & No Right Click CVE ID: CVE-2023-36678 CVSS Score: 4.4 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9589d44b-55c3-45b4-84bb-c86143de3f95>
Affected Software: Simple Light Weight Social Share (Tweet, Like, Share and Linkedin) CVE ID: CVE-2023-37388 CVSS Score: 4.4 (Medium) Researcher/s: Yuki Haruma Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/98780ecc-fb45-4392-955d-ddecf9f7fca1>
Affected Software: Mobile Call Now & Map Buttons CVE ID: CVE-2023-24401 CVSS Score: 4.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a10ee756-1b71-4232-817c-1ba6ead7f0f0>
Affected Software: Simple Site Verify CVE ID: CVE-2023-36688 CVSS Score: 4.4 (Medium) Researcher/s: yuyudhn Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b1ea7e04-d3b3-43fa-be9a-a2d5ac3e34c3>
Affected Software: Image Social Feed Plugin CVE ID: CVE-2023-24412 CVSS Score: 4.4 (Medium) Researcher/s: yuyudhn Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/bcaa19b0-2d55-4a0c-98e7-9a38488dd922>
Affected Software: oAuth Twitter Feed for Developers CVE ID: CVE-2023-25042 CVSS Score: 4.4 (Medium) Researcher/s: Rio Darmawan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/fa3819b1-8e7c-4e97-bac5-96d73d935845>
Affected Software: Gift Cards (Gift Vouchers and Packages) (WooCommerce Supported) CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0007d830-2e68-4c2f-8fac-f4363bc2d73d>
Affected Software: WP Dummy Content Generator CVE ID: CVE-2023-37392 CVSS Score: 4.3 (Medium) Researcher/s: Elliot Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0576737d-8330-4a80-af70-4f0eab6657ed>
Affected Software: Classified Listing – Classified ads & Business Directory Plugin CVE ID: CVE-2023-37387 CVSS Score: 4.3 (Medium) Researcher/s: Lana Codes Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2352dce7-5302-4892-9ae2-bf814f029af4>
Affected Software: ShopLentor – WooCommerce Builder for Elementor & Gutenberg +10 Modules – All in One Solution (formerly WooLentor) CVE ID: CVE-2022-47172 CVSS Score: 4.3 (Medium) Researcher/s: Muhammad Daffa Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5c068079-0857-4116-8edb-1bc2fea3c6b7>
Affected Software: BadgeOS CVE ID: CVE-2023-2172 CVSS Score: 4.3 (Medium) Researcher/s: Alex Thomas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b>
Affected Software: BadgeOS CVE ID: CVE-2023-2174 CVSS Score: 4.3 (Medium) Researcher/s: Alex Thomas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/64e0adbc-c524-4f9d-9741-ce69edf888f7>
Affected Software: Visibility Logic for Elementor CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/72c04de6-78d2-4a45-834a-01ed879b528f>
Affected Software: WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/747afa58-182a-4fb3-bfe3-f15db0b1d85a>
Affected Software: Baidu Tongji generator CVE ID: CVE-2023-31230 CVSS Score: 4.3 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/8438ea46-9ac1-4ef5-a436-e438c35a4321>
Affected Software: WP RSS Images CVE ID: CVE-2023-36693 CVSS Score: 4.3 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/adb70798-2ef9-4384-bcca-8862afa044ed>
Affected Software: Visibility Logic for Elementor CVE ID: CVE-2022-47169 CVSS Score: 4.3 (Medium) Researcher/s: Muhammad Daffa Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/bb8aca3a-e4f7-41d6-9ea9-d189817c2c04>
Affected Software: Bulk edit image alt tag, caption & description – WordPress Media Library Helper by Codexin CVE ID: CVE-2023-37386 CVSS Score: 4.3 (Medium) Researcher/s: Lana Codes Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dc2356b2-e153-4e80-bfac-c25c15cdc259>
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (July 3, 2023 to July 9, 2023) appeared first on Wordfence.
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.006 Low
EPSS
Percentile
75.6%