Wordfence Intelligence Weekly WordPress Vulnerability Report (July 31, 2023 to August 6, 2023)
Last week, there were 29 vulnerabilities disclosed in 24 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 18 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Total Unpatched & Patched Vulnerabilities Last Week
Patch Status | Number of Vulnerabilities |
Unpatched | 2 |
Patched | 27 |
Total Vulnerabilities by CVSS Severity Last Week
Severity Rating | Number of Vulnerabilities |
Low Severity | 0 |
Medium Severity | 19 |
High Severity | 7 |
Critical Severity | 3 |
Total Vulnerabilities by CWE Type Last Week
Vulnerability Type by CWE | Number of Vulnerabilities |
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 11 |
Improper Privilege Management | 4 |
Cross-Site Request Forgery (CSRF) | 3 |
Improper Control of Generation of Code (‘Code Injection’) | 3 |
Missing Authorization | 2 |
Information Exposure | 2 |
Authentication Bypass Using an Alternate Path or Channel | 1 |
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | 1 |
Use of Less Trusted Source | 1 |
Unrestricted Upload of File with Dangerous Type | 1 |
Researchers That Contributed to WordPress Security Last Week
Researcher Name | Number of Vulnerabilities |
Lana Codes (Wordfence Vulnerability Researcher) |
5 |
Dmitriy | 1 |
DoYeon Park | 1 |
Bob Matyas | 1 |
Marc-Alexandre Montpas | 1 |
Rafie Muhammad | 1 |
Dmitrii Ignatyev | 1 |
Erwan LR | 1 |
Daniel Ruf | 1 |
MyungJu Kim | 1 |
Pallab Jyoti Borah | 1 |
Sayandeep Dutta | 1 |
Vikas Kumawat | 1 |
Satoo Nakano | 1 |
Ryotaro Imamura | 1 |
Vincenzo Turturro | 1 |
Gianluca Parisi | 1 |
Vincenzo Cantatore | 1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
WordPress Plugins with Reported Vulnerabilities Last Week
Software Name | Software Slug |
Advanced Custom Fields (ACF) | advanced-custom-fields |
Booster for WooCommerce | woocommerce-jetpack |
Bus Ticket Booking with Seat Reservation | bus-ticket-booking-with-seat-reservation |
Duplicate Post | copy-delete-posts |
FormCraft – Contact Form Builder for WordPress | formcraft-form-builder |
Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor | front-editor |
Import All Pages, Post types, Products, Orders, and Users as XML & CSV | wp-ultimate-csv-importer |
JetElements | jet-elements |
Media from FTP | media-from-ftp |
MultiParcels Shipping For WooCommerce | multiparcels-shipping-for-woocommerce |
Order Delivery Date for WooCommerce | order-delivery-date-for-woocommerce |
PostX – Gutenberg Post Grid Blocks | ultimate-post |
Shop as a Customer for WooCommerce | shop-as-a-customer-for-woocommerce |
Short URL | shorten-url |
Simple Blog Card | simple-blog-card |
Simple Share Follow Button | simple-share-follow-button |
Simple Ticker | simple-ticker |
Stripe Payment Plugin for WooCommerce | payment-gateway-stripe-and-woocommerce-integration |
Subscribers Text Counter | subscribers-text-counter |
TI WooCommerce Wishlist | ti-woocommerce-wishlist |
Upload Media By URL | upload-media-by-url |
User Access Manager | user-access-manager |
WordPress Job Board and Recruitment Plugin – JobWP | jobwp |
wpShopGermany – Protected Shops | wpshopgermany-protectedshops |
Vulnerability Details
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
Stripe Payment Plugin for WooCommerce <= 3.7.7 – Authentication Bypass
CVE ID: CVE-2023-3162
CVSS Score: 9.8 (Critical)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7b
TI WooCommerce Wishlist <= 2.7.3 – Unauthenticated Blind SQL Injection via Rest API
CVE ID: CVE Unknown
CVSS Score: 9.8 (Critical)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/82420667-9ba6-46ed-9a53-d16850755bb9
WordPress Job Board and Recruitment Plugin – JobWP <= 2.0 – Arbitrary File Upload via ‘jobwp_upload_resume’
CVE ID: CVE-2023-29384
CVSS Score: 9.8 (Critical)
Researcher/s: MyungJu Kim
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/88f4c567-eb57-4f98-afdc-65f8863b90c3
Shop as a Customer for WooCommerce <= 1.2.3 – Authenticated (Shop Manager+) Privilege Escalation
CVE ID: CVE Unknown
CVSS Score: 8.8 (High)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3c730a69-015a-4b36-aa16-eff6916a302f
Shop as a Customer for WooCommerce <= 1.1.7 – Authenticated (Subscriber+) Privilege Escalation
CVE ID: CVE Unknown
CVSS Score: 8.8 (High)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6d041edb-70f3-4894-8a78-f6881541054c
JetElements <= 2.6.10 – Authenticated (Contributor+) Remote Code Execution
CVE ID: CVE-2023-39157
CVSS Score: 8.8 (High)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/73fca37e-c6cf-420c-b984-3ef89acf3216
WP Ultimate CSV Importer <= 7.9.8 – Authenticated (Author+) PHP File Creation to Remote Code Execution
CVE ID: CVE-2023-4141
CVSS Score: 8 (High)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b4fe8b1f-da1c-4f94-9ab4-272766b488c3
WP Ultimate CSV Importer <= 7.9.8 – Authenticated (Author+) Remote Code Execution
CVE ID: CVE-2023-4142
CVSS Score: 8 (High)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/db1bad2e-55df-40c5-9a3f-651858a19b42
WP Ultimate CSV Importer <= 7.9.8 – Sensitive Information Exposure via Directory Listing
CVE ID: CVE-2023-4139
CVSS Score: 7.5 (High)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6404476e-0c32-4f8e-882f-6a1785ba5748
Booster for WooCommerce 7.0.0 – Authenticated (Shop Manager+) Missing Authorization to Arbitrary Options Update
CVE ID: CVE Unknown
CVSS Score: 7.2 (High)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0903bd2b-240f-4791-bfa6-f727d193af4a
WP Ultimate CSV Importer <= 7.9.8 – Arbitrary Usermeta Update to Authenticated (Author+) Privilege Escalation
CVE ID: CVE-2023-4140
CVSS Score: 6.6 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5fdba41f-daa5-44e8-bc47-aa8b7bd31054
Upload Media By URL <= 1.0.7 – Cross-Site Request Forgery via ‘umbu_download’
CVE ID: CVE-2023-3720
CVSS Score: 6.5 (Medium)
Researcher/s: Dmitriy
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/18a0b8f2-4512-46a5-92a6-66d375c986dd
Simple Ticker <= 3.05 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE Unknown
CVSS Score: 6.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/162595bb-d41b-4dfd-bfda-3a1e5794eaaf
Simple Blog Card <= 1.30 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE-2023-4035
CVSS Score: 6.4 (Medium)
Researcher/s: Dmitrii Ignatyev
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/78f6d878-6ba8-4d80-9c9b-1a363d6aaed5
Simple Share Follow Button <= 1.03 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
CVE ID: CVE Unknown
CVSS Score: 6.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ed98d335-16f9-4be8-bace-06e2b5db4cb9
Media from FTP <= 11.15 – Improper Privilege Management
CVE ID: CVE Unknown
CVSS Score: 6.3 (Medium)
Researcher/s: Marc-Alexandre Montpas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5f9cf9c5-d836-4414-a53f-adee2784bd96
Duplicate Post <= 1.4.1 – Cross-Site Request Forgery via ‘cdp_action_handling’ AJAX action
CVE ID: CVE Unknown
CVSS Score: 6.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a8c8d839-d2a4-4b2a-ad61-a3cda7826636
PostX – Gutenberg Post Grid Blocks <= 3.0.5 – Reflected Cross-Site Scripting via ‘postx_type’
CVE ID: CVE-2023-3992
CVSS Score: 6.1 (Medium)
Researcher/s: Bob Matyas
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5ab2e2ae-6f46-4815-a2d2-407767bfaba8
MultiParcels Shipping For WooCommerce <= 1.15.3 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-3954
CVSS Score: 6.1 (Medium)
Researcher/s: Erwan LR
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/83a3f61c-2385-456f-bca3-6d3f3ffd9694
Order Delivery Date for WooCommerce <= 3.20.0 – Reflected Cross-Site Scripting via ‘orddd_lite_custom_startdate’ and ‘orddd_lite_custom_enddate’
CVE ID: CVE Unknown
CVSS Score: 6.1 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9719d083-cc7c-4655-a4c4-f5370cfe76e0
Short URL <= 1.6.7 – Missing Authorization via multiple AJAX functions
CVE ID: CVE Unknown
CVSS Score: 6.1 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/dcd05142-9700-46a8-9ca6-f85e81dfee0d
Bus Ticket Booking with Seat Reservation <= 5.2.3 – Reflected Cross-Site Scripting
CVE ID: CVE-2023-4067
CVSS Score: 6.1 (Medium)
Researcher/s: Vincenzo Turturro, Gianluca Parisi, Vincenzo Cantatore
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ff2855cb-e4a8-4412-af24-4cee03ae2d43
User Access Manager <= 2.2.16 – IP Spoofing
CVE ID: CVE-2022-1601
CVSS Score: 5.3 (Medium)
Researcher/s: Daniel Ruf
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/88c5752c-ef4e-4343-810e-ecf1f33d3538
wpShopGermany – Protected Shops <= 2.0 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-39919
CVSS Score: 4.4 (Medium)
Researcher/s: DoYeon Park
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/21cc5aec-ab5f-412b-aed0-bb41584a84cf
FormCraft <= 1.2.6 – Authenticated (Admin+) Stored Cross-Site Scripting
CVE ID: CVE-2023-3501
CVSS Score: 4.4 (Medium)
Researcher/s: Sayandeep Dutta
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c17967a4-20df-4b23-973f-591a0caeea39
Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor <= 4.0.4 – Authenticated(Administrator+) Stored Cross-Site Scripting
CVE ID: CVE-2023-1982
CVSS Score: 4.4 (Medium)
Researcher/s: Vikas Kumawat
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/dfea441c-2e77-47fa-8f6e-8d17d0c90ebe
Advanced Custom Fields <= 6.1.7 – Authenticated (Administrator+) Stored Cross-Site Scripting
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Satoo Nakano, Ryotaro Imamura
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f412bdb0-953d-4375-85c2-b87f3aa77d60
Simple Blog Card <= 1.31 – Sensitive Information Exposure
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/36cec19a-4631-4ada-b37a-f4b2dc264096
Subscribers Text Counter <= 1.7 – Cross-Site Request Forgery to Settings Update and Cross-Site Scripting
CVE ID: CVE-2023-3356
CVSS Score: 4.3 (Medium)
Researcher/s: Pallab Jyoti Borah
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a548e71f-4f36-4a29-8293-474e119f09cc
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
Comments