Wordfence Intelligence Weekly WordPress Vulnerability Report (July 22, 2024 to July 28, 2024)


📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugin and themes at no cost to vendors? Researchers can earn up to $10,400, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest. 


Last week, there were 72 vulnerabilities disclosed in 55 WordPress Plugins and 2 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 29 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 17,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Patched 50
Unpatched 22


Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Medium Severity 50
High Severity 16
Critical Severity 6


Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 23
Missing Authorization 14
Exposure of Sensitive Information to an Unauthorized Actor 11
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') 6
Cross-Site Request Forgery (CSRF) 5
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 4
Deserialization of Untrusted Data 2
Incorrect Privilege Assignment 2
Unrestricted Upload of File with Dangerous Type 2
Authentication Bypass Using an Alternate Path or Channel 1
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 1
Server-Side Request Forgery (SSRF) 1


Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
11
10
9
5
4
3
3
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Add Admin CSS add-admin-css
Add Admin JavaScript add-admin-javascript
Admin Post Navigation admin-post-navigation
Admin Trim Interface admin-trim-interface
AI Engine ai-engine
All-in-One Video Gallery all-in-one-video-gallery
AMP for WP – Accelerated Mobile Pages accelerated-mobile-pages
Aramex Shipping WooCommerce aramex-shipping-woocommerce
aThemes Starter Sites athemes-starter-sites
Campaign Monitor for WordPress forms-for-campaign-monitor
CM WordPress Search And Replace Plugin cm-on-demand-search-and-replace
Custom Query Blocks post-type-archive-mapping
Flipbox Builder flipbox-builder
Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder fluentform
Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels, Order Bumps & One Click Upsells funnel-builder
Generate Images – Magic Post Thumbnail magic-post-thumbnail
Great Restaurant Menu WP best-restaurant-menu-by-pricelisto
Grow by Tradedoubler – Advertiser Plugin for WooCommerce tradedoubler-affiliate-tracker
Happy Addons for Elementor happy-elementor-addons
Icegram Engage – Ultimate WP Popup Builder, Lead Generation, Optins, and CTA icegram
IgnitionDeck Crowdfunding Platform ignitiondeck
Image SEO – AI-Driven Image SEO Optimizer imageseo
Intelligence intelligence
Language Translate Widget for WP – ConveyThis conveythis-translate
LearnPress – WordPress LMS Plugin learnpress
ListingPro Plugin listingpro-plugin
LiteSpeed Cache litespeed-cache
Master Currency WP mastercurrency-wp
MaxiBlocks: 2300+ Patterns, 280+ Pages, 14.3K Icons & 100 Styles maxi-blocks
Media.net Ads Manager media-net-ads-manager
News Element Elementor Blog Magazine news-element
Ninja Forms – The Contact Form Builder That Grows With You ninja-forms
One Click Close Comments one-click-close-comments
ParityPress – Parity Pricing with Discount Rules paritypress
Photo Gallery, Images, Slider in Rbs Image Gallery robo-gallery
Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery nextgen-gallery
Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons contest-gallery
Piotnet Addons For Elementor piotnet-addons-for-elementor
PowerPack for Beaver Builder bbpowerpack
PowerPack Pro for Elementor powerpack-elements
Pretty Simple Popup Builder pretty-simple-popup-builder
Redux Framework redux-framework
Royal Elementor Addons and Templates royal-elementor-addons
Social Auto Poster social-auto-poster
The Events Calendar the-events-calendar
Timetable and Event Schedule by MotoPress mp-timetable
Tutor LMS – Migration Tool tutor-lms-migration-tool
Ultimate WordPress Auction Plugin ultimate-auction
WooCommerce - PDF Vouchers woocommerce-pdf-vouchers
WooCommerce Product Table Lite wc-product-table-lite
WP Booking Calendar booking
WP EasyPay – Create Your Payment Forms to Pay with Square – Square for WordPress Plugin: Integrate Square with WordPress to Collect Payments wp-easy-pay
Wp EMember wp-emember
WP Meteor Website Speed Optimization Addon wp-meteor
Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress youzify


WordPress Themes with Reported Vulnerabilities Last Week

Software Name Software Slug
Himalayas himalayas
ListingPro - WordPress Directory & Listing Theme listingpro


Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-39622
Patch Status
Unpatched
Published
Jul 22, 2024
CVSS Rating
Critical (10.0)
CVE-ID
CVE-2024-38795
Patch Status
Unpatched
Published
Jul 22, 2024
Affected Software
ListingPro Plugin
Researcher
CVSS Rating
Critical (9.9)
CVE-ID
CVE-2024-39620
Patch Status
Unpatched
Published
Jul 22, 2024
Affected Software
ListingPro Plugin
Researcher
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-6460
Patch Status
Patched
Published
Jul 26, 2024
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-39619
Patch Status
Unpatched
Published
Jul 22, 2024
Affected Software
ListingPro Plugin
Researcher
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-6459
Patch Status
Unpatched
Published
Jul 27, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-38793
Patch Status
Patched
Published
Jul 22, 2024
Affected Software
Great Restaurant Menu WP
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6152
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Flipbox Builder
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6589
Patch Status
Patched
Published
Jul 24, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39624
Patch Status
Unpatched
Published
Jul 22, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39623
Patch Status
Unpatched
Published
Jul 22, 2024
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6431
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Media.net Ads Manager
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39633
Patch Status
Patched
Published
Jul 24, 2024
Affected Software
PowerPack for Beaver Builder
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-39634
Patch Status
Patched
Published
Jul 24, 2024
Affected Software
PowerPack Pro for Elementor
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-6756
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
High (8.3)
CVE-ID
CVE-2024-39621
Patch Status
Unpatched
Published
Jul 22, 2024
Affected Software
ListingPro Plugin
Researcher
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-6750
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
High (7.3)
CVE-ID
CVE-2024-7027
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
WooCommerce - PDF Vouchers
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-6828
Patch Status
Patched
Published
Jul 22, 2024
Affected Software
Redux Framework
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-6753
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-6931
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
The Events Calendar
Researcher
CVSS Rating
Medium (6.6)
CVE-ID
CVE-2024-39630
Patch Status
Patched
Published
Jul 22, 2024
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-6755
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-38791
Patch Status
Patched
Published
Jul 22, 2024
Affected Software
AI Engine
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6629
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
All-in-One Video Gallery
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6897
Patch Status
Patched
Published
Jul 26, 2024
Affected Software
aThemes Starter Sites
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6627
Patch Status
Patched
Published
Jul 26, 2024
Affected Software
Happy Addons for Elementor
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6634
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Master Currency WP
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6752
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6458
Patch Status
Patched
Published
Jul 26, 2024
Affected Software
WooCommerce Product Table Lite
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-6930
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
WP Booking Calendar
Researcher
CVSS Rating
Medium (6.3)
CVE-ID
CVE-2024-6751
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Social Auto Poster
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-3246
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
LiteSpeed Cache
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-5744
Patch Status
Patched
Published
Jul 23, 2024
Affected Software
Wp EMember
Researcher
CVSS Rating
Medium (5.8)
CVE-ID
CVE-2024-6591
Patch Status
Patched
Published
Jul 26, 2024
Researcher
CVSS Rating
Medium (5.4)
CVE-ID
CVE-2024-4410
Patch Status
Patched
Published
Jul 26, 2024
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6547
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Add Admin CSS
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6548
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Add Admin JavaScript
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6549
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Admin Post Navigation
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6545
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Admin Trim Interface
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6566
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Aramex Shipping WooCommerce
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6569
Patch Status
Patched
Published
Jul 26, 2024
Affected Software
Campaign Monitor for WordPress
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-38794
Patch Status
Patched
Published
Jul 22, 2024
Affected Software
Custom Query Blocks
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-39625
Patch Status
Patched
Published
Jul 22, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6573
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
Intelligence
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6546
Patch Status
Unpatched
Published
Jul 26, 2024
Affected Software
One Click Close Comments
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6571
Patch Status
Patched
Published
Jul 23, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-5614
Patch Status
Patched
Published
Jul 26, 2024
Affected Software
Piotnet Addons For Elementor
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-1798
Patch Status
Unpatched
Published
Jul 26, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6553
Patch Status
Patched
Published
Jul 23, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-6724
Patch Status
Patched
Published
Jul 22, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39629
Patch Status
Unpatched
Published
Jul 22, 2024
Affected Software
Himalayas
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39627
Patch Status
Patched
Published
Jul 22, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-6661
Patch Status
Patched
Published
Jul 26, 2024
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-39626
Patch Status
Unpatched
Published
Jul 22, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-5028
Patch Status
Patched
Published
Jul 22, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-39628
Patch Status
Patched
Published
Jul 24, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-1804
Patch Status
Unpatched
Published
Jul 26, 2024
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-39635
Patch Status
Patched
Published
Jul 24, 2024


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

Did you enjoy this post? Share it!

Comments

3 Comments
  • [Automatic Translation]
    We suggest merging "Total Unpatched & Patched Vulnerabilities Last Week" with "Total Vulnerabilities by CVSS Severity Last Week" into a single table.
    Tanks!
    José Mario
    01/08/2024 - 12:20h

    • Hi José, thank you for the suggestion! We will keep in mind as we continue to evolve the weekly vulnerability report.

      • [Automatic Translation]

        Hi Chloe, thanks for your attention!