Wordfence Intelligence Weekly WordPress Vulnerability Report (September 16, 2024 to September 22, 2024)


📢 Did you know Wordfence runs a Bug Bounty Program for all WordPress plugins and themes at no cost to vendors? Through October 7th, 2024, XSS vulnerabilities in all plugins and themes with >=1,000 Active Installs are in scope for all researchers. In addition, through October 14th, 2024, researchers can earn up to $31,200, for all in-scope vulnerabilities submitted to our Bug Bounty Program! Find a vulnerability, submit the details directly to us, and we handle all the rest.


Last week, there were 36 vulnerabilities disclosed in 30 WordPress Plugins and 4 WordPress Themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 24 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 18,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

  • WAF-RULE-744 – Data redacted while we work with the vendor on a patch.
  • WAF-RULE-742 – Data redacted while we work with the vendor on a patch.
  • WAF-RULE-741 – Data redacted while we work with the vendor on a patch.

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Patched 26
Unpatched 10


Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Medium Severity 25
High Severity 9
Critical Severity 2


Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 16
Cross-Site Request Forgery (CSRF) 5
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 5
Use of Less Trusted Source 2
Authorization Bypass Through User-Controlled Key 1
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') 1
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) 1
Improper Privilege Management 1
Incorrect Privilege Assignment 1
Incorrect Regular Expression 1
Missing Authorization 1
URL Redirection to Untrusted Site ('Open Redirect') 1


Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
3
3
2
2
luc
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and earn a bounty on in-scope vulnerabilities through our Bug Bounty Program. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Backup Database backup-database
Custom Twitter Feeds – A Tweets Widget or X Feed Widget custom-twitter-feeds
GDPR Cookie Consent webtoffee-gdpr-cookie-consent
Geo Mashup geo-mashup
Greenshift – animation and page builder blocks greenshift-animation-and-page-builder-blocks
Gutenberg Blocks – Unlimited blocks For Gutenberg unlimited-blocks
houzez-login-register houzez-login-register
IMPress for IDX Broker idx-broker-platinum
LatePoint Plugin latepoint
Limit Login Attempts Plus – WordPress Limit Login Attempts By Felix limit-login-attempts-plus
Maintenance Redirect jf3-maintenance-mode
MC4WP: Mailchimp for WordPress mailchimp-for-wp
PeoplePond peoplepond
Product Carousel Slider & Grid Ultimate for WooCommerce woo-product-carousel-slider-and-grid-ultimate
Property Hive propertyhive
Relevanssi – A Better Search relevanssi
Share This Image share-this-image
Simple Nav Archives simple-nav-archives
SKT Templates – 100% free Elementor & Gutenberg templates skt-templates
Spice Starter Sites spice-starter-sites
Team Showcase team
TI WooCommerce Wishlist ti-woocommerce-wishlist
WCFM Marketplace – Multivendor Marketplace for WooCommerce wc-multivendor-marketplace
Webo-facto webo-facto-connector
Welcart e-Commerce usc-e-shop
WooCommerce Multilingual & Multicurrency with WPML woocommerce-multilingual
WordPress WP-Advanced-Search wp-advanced-search
WP Custom Fields Search wp-custom-fields-search
WP Hardening (discontinued) wp-security-hardening
WPCargo Track & Trace wpcargo


WordPress Themes with Reported Vulnerabilities Last Week

Software Name Software Slug
Houzez houzez
Roseta roseta
Septera septera
Verbosa verbosa


Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities. If you’d like to receive real-time notifications whenever a vulnerability is added to the Wordfence Intelligence Vulnerability Database, check out our Slack and HTTP Webhook Integration, which is completely free to utilize.

CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-8911
Patch Status
Patched
Published
Sep 20, 2024
Affected Software
LatePoint Plugin
Researcher
CVSS Rating
Critical (9.8)
CVE-ID
CVE-2024-8853
Patch Status
Patched
Published
Sep 17, 2024
Affected Software
Webo-facto
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-22303
Patch Status
Patched
Published
Sep 17, 2024
Affected Software
Houzez
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-21743
Patch Status
Patched
Published
Sep 17, 2024
Affected Software
houzez-login-register
Researcher
CVSS Rating
High (8.8)
CVE-ID
CVE-2024-8490
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Property Hive
Researcher
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-9156
Patch Status
Patched
Published
Sep 19, 2024
Affected Software
TI WooCommerce Wishlist
Researcher
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-9796
Patch Status
Patched
Published
Sep 17, 2024
Affected Software
WordPress WP-Advanced-Search
Researcher
CVSS Rating
High (7.5)
CVE-ID
CVE-2024-44004
Patch Status
Unpatched
Published
Sep 16, 2024
Affected Software
WPCargo Track & Trace
Researcher
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-8397
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
GDPR Cookie Consent
CVSS Rating
High (7.2)
CVE-ID
CVE-2024-8761
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Share This Image
Researcher
CVSS Rating
Medium (6.5)
CVE-ID
CVE-2024-44008
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Geo Mashup
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-44047
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
IMPress for IDX Broker
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-9021
Patch Status
Patched
Published
Sep 17, 2024
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-45451
Patch Status
Unpatched
Published
Sep 16, 2024
Affected Software
Roseta
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-45452
Patch Status
Unpatched
Published
Sep 16, 2024
Affected Software
Septera
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-44050
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Verbosa
Researcher
CVSS Rating
Medium (6.4)
CVE-ID
CVE-2024-8364
Patch Status
Unpatched
Published
Sep 18, 2024
Affected Software
WP Custom Fields Search
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8850
Patch Status
Patched
Published
Sep 18, 2024
Affected Software
MC4WP: Mailchimp for WordPress
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-8085
Patch Status
Unpatched
Published
Sep 20, 2024
Affected Software
PeoplePond
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-44007
Patch Status
Patched
Published
Sep 16, 2024
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-44003
Patch Status
Unpatched
Published
Sep 16, 2024
Affected Software
Spice Starter Sites
Researcher
CVSS Rating
Medium (6.1)
CVE-ID
CVE-2024-44002
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Team Showcase
Researcher
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2022-4533
Patch Status
Unpatched
Published
Sep 18, 2024
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-45453
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
Maintenance Redirect
CVSS Rating
Medium (5.3)
CVE-ID
CVE-2024-6641
Patch Status
Patched
Published
Sep 17, 2024
Affected Software
WP Hardening (discontinued)
Researcher
CVSS Rating
Medium (4.9)
CVE-ID
CVE-2024-42404
Patch Status
Patched
Published
Sep 18, 2024
Affected Software
Welcart e-Commerce
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-8702
Patch Status
Unpatched
Published
Sep 20, 2024
Affected Software
Backup Database
Researcher
CVSS Rating
Medium (4.4)
CVE-ID
CVE-2024-8680
Patch Status
Patched
Published
Sep 20, 2024
Affected Software
MC4WP: Mailchimp for WordPress
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-8286
Patch Status
Patched
Published
Sep 16, 2024
Affected Software
GDPR Cookie Consent
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-8398
Patch Status
Unpatched
Published
Sep 20, 2024
Affected Software
Simple Nav Archives
Researcher
CVSS Rating
Medium (4.3)
CVE-ID
CVE-2024-44006
Patch Status
Patched
Published
Sep 16, 2024


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

Did you enjoy this post? Share it!

Comments

2 Comments
  • The Verbosa theme appears to be updated to version 1.2.3.1, but the relevant entry in the WF database still lists it as "unpatched" for versions >= 1.2.3 . Can the entry be corrected to reflect the availability of the latest version, as it appears to have patched the issue now, because it passes a full WF scan on the one site where I run this theme.

    • Thank you for letting us know! We reviewed the latest version and confirmed the issue was patched in 1.2.3.1 so we've updated the record to reflect that.