Vulnerabilities protected by our Malicious File Upload firewall rule

493,320
Attacks Blocked in Past 24 Hours

Showing 201-220 of 568 Vulnerabilities

Title CVE ID CVSS Vector Date
WPtouch <= 4.3.44 - Authenticated (Administrator+) Arbitrary File Upload CVE-2022-3416 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H December 19, 2022
JobBoardWP <= 1.2.1 - Unauthenticated Arbitrary File Upload CVE-2022-4061 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 28, 2022
Return Refund and Exchange For WooCommerce <= 4.0.8 - Arbitrary File Upload CVE-2022-4047 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H November 25, 2022
Yith WooCommerce Gift Cards Premium <= 3.19.0 - Unauthenticated Arbitrary File Upload CVE-2022-45359 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 22, 2022
Booking calendar, Appointment Booking System <= 3.2.1 - Unauthenticated Arbitrary File Upload CVE-2022-3982 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 21, 2022
User Registration <= 2.2.4 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2022-3912 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H November 21, 2022
Motors – Car Dealer, Classifieds & Listing <= 1.4.3 - Unauthenticated Arbitrary File Upload CVE-2022-3989 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 21, 2022
Listingo <= 3.2.5 - Unauthenticated Arbitrary File Upload CVE-2022-3921 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 21, 2022
PostmagThemes Demo Import <= 1.0.7 - Authenticated (Administrator+) Arbitrary File Upload CVE-2022-1540 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H November 11, 2022
wpForo Forum <= 2.0.9 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2022-40200 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H November 9, 2022
Theme Demo Import <= 1.1.3 - Authenticated (Administrator+) Arbitrary File Upload CVE-2022-1538 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H November 8, 2022
Api2Cart Bridge Connector <= 1.1.0 - Arbitrary File Upload CVE-2022-42698 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H October 28, 2022
SEO Plugin by Squirrly SEO <= 12.1.10 - Authenticated (Contributor+) Arbitrary File Upload CVE-2022-38140 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H October 25, 2022
Import any XML or CSV File to WordPress <= 3.6.8 - Authenticated (Administrator+) Arbitrary File Upload CVE-2022-3418 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N October 17, 2022
Role Based Pricing for WooCommerce <= 1.6.1 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2022-3537 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H October 17, 2022
Create Block Theme <= 1.2.1 - Unauthenticated Arbitrary File Upload 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H October 5, 2022
MemberPress Downloads <= 1.2.5 - Authenticated (Subscriber+) Arbitrary File Upload 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H September 19, 2022
Frontend File Manager <= 21.2 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2022-3125 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H September 7, 2022
CM Download Manager <= 2.8.5 - Authenticated (Administrator+) Arbitrary File Upload CVE-2022-3076 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H September 5, 2022
Scripts Organizer < 3.0 - Unauthenticated Arbitrary File Upload CVE-2021-24890 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H September 5, 2022

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation