Last week, there were 84 vulnerabilities disclosed in 76 WordPress Plugins and 2 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 42 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
_Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Patch Status | Number of Vulnerabilities |
---|---|
Unpatched | 20 |
Patched | 64 |
Severity Rating | Number of Vulnerabilities |
---|---|
Low Severity | 0 |
Medium Severity | 69 |
High Severity | 9 |
Critical Severity | 6 |
Vulnerability Type by CWE | Number of Vulnerabilities |
---|---|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 35 |
Missing Authorization | 14 |
Cross-Site Request Forgery (CSRF) | 11 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 9 |
Authorization Bypass Through User-Controlled Key | 5 |
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) | 1 |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | 1 |
Improper Neutralization of Formula Elements in a CSV File | 1 |
URL Redirection to Untrusted Site ('Open Redirect') | 1 |
Improper Control of Generation of Code ('Code Injection') | 1 |
Incorrect Privilege Assignment | 1 |
Information Exposure | 1 |
Insufficient Verification of Data Authenticity | 1 |
Authentication Bypass Using an Alternate Path or Channel | 1 |
External Control of File Name or Path | 1 |
Researcher Name | Number of Vulnerabilities |
---|---|
Rafie Muhammad | 15 |
Marco Wotschka | |
(Wordfence Vulnerability Researcher) | 7 |
Rafshanzani Suhada | 4 |
Truoc Phan | 4 |
Abdi Pranata | 3 |
Le Ngoc Anh | 3 |
LEE SE HYOUNG | 3 |
Lana Codes | |
(Wordfence Vulnerability Researcher) | 3 |
Miguel Santareno | 2 |
Alex Thomas | |
(Wordfence Vulnerability Researcher) | 2 |
Erwan LR | 2 |
Mateus Machado Tesser | 2 |
Rio Darmawan | 2 |
Christiaan Swiers | 1 |
drwtsn | 1 |
Fioravante Souza | 1 |
An Đặng | 1 |
Nguyen Xuan Chien | 1 |
Chien Vuong | 1 |
Webbernaut | 1 |
Rio Darmanwan | 1 |
Jonas Höbenreich | 1 |
Skalucy | 1 |
Lucio Sá | 1 |
Mika | 1 |
Fariq Fadillah Gusti Insani | 1 |
Dipak Panchal | 1 |
yuyudhn | 1 |
qerogram | 1 |
Jihoon Lee | 1 |
daniloalbuqrque | 1 |
Taurus Omar | 1 |
qilin_99 | 1 |
BOT | 1 |
Robert Lockwood | 1 |
Shunsuke Aoki | 1 |
Bae Song Hyun | 1 |
FearZzZz | 1 |
Bob Matyas | 1 |
Theodoros Malachias | 1 |
Shreya Pohekar | 1 |
Felipe Restrepo Rodriguez | 1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
Software Name | Software Slug |
---|---|
AN_GradeBook | an-gradebook |
About Me 3000 widget | about-me-3000 |
All In One Redirection | all-in-one-redirection |
BBS e-Popup | bbs-e-popup |
Booking Calendar Contact Form | booking-calendar-contact-form |
Booking Calendar | Appointment Booking |
Buy Me a Coffee – Button and Widget Plugin | buymeacoffee |
CMS Commander – Manage Multiple Sites | cms-commander-client |
Colibri Page Builder | colibri-page-builder |
Companion Sitemap Generator – HTML & XML | companion-sitemap-generator |
Complianz Premium – GDPR/CCPA Cookie Consent | complianz-gdpr-premium |
Complianz – GDPR/CCPA Cookie Consent | complianz-gdpr |
Contact Form by WPForms – Drag & Drop Form Builder for WordPress | wpforms-lite |
Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress | contact-form-to-db |
Core Web Vitals & PageSpeed Booster | core-web-vitals-pagespeed-booster |
Customer Service Software & Support Ticket System | wp-ticket |
Display Custom Fields – wpView | wpview |
Elementor Website Builder Pro | elementor-pro |
Enable SVG Uploads | enable-svg-uploads |
Enable SVG, WebP & ICO Upload | enable-svg-webp-ico-upload |
EventON | eventon-lite |
Export All URLs | export-all-urls |
Extra User Details | extra-user-details |
Five Star Restaurant Reservations – WordPress Booking Plugin | restaurant-reservations |
Float menu – awesome floating side menu | float-menu |
Form Builder | Create Responsive Contact Forms |
Gallery Metabox | gallery-metabox |
Gravity Forms | gravityforms |
Greeklish-permalink | greeklish-permalink |
Gutenverse – Gutenberg Blocks – Page Builder for Site Editor | gutenverse |
HTTP Headers | http-headers |
Image Protector | image-protector |
InventoryPress | inventorypress |
JS Help Desk – Best Help Desk & Support Plugin | js-support-ticket |
Lana Shortcodes | lana-shortcodes |
Lana Text to Image | lana-text-to-image |
MStore API | mstore-api |
Mail Queue | mail-queue |
Mailtree Log Mail | mailtree-log-mail |
MainWP Child – Securely Connects Sites to the MainWP WordPress Manager Dashboard | mainwp-child |
Membership Plugin – Restrict Content | restrict-content |
Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress | metform |
MojoPlug Slide Panel | mojoplug-slide-panel |
MyCurator Content Curation | mycurator |
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress | ninja-forms |
OOPSpam Anti-Spam | oopspam-anti-spam |
Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress | wp-user-avatar |
Popup by Supsystic | popup-by-supsystic |
PostX – Gutenberg Post Grid Blocks | ultimate-post |
Potent Donations for WooCommerce | donations-for-woocommerce |
PrePost SEO | prepost-seo |
Product Vendors | woocommerce-product-vendors |
Quick Post Duplicator | rduplicator |
ReDi Restaurant Reservation | redi-restaurant-reservation |
Sermon'e – Sermons Online | sermone-online-sermons-management |
Simple Iframe | simple-iframe |
Smoothscroller | smoothscroller |
Social Share, Social Login and Social Comments Plugin – Super Socializer | super-socializer |
Spam protection, AntiSpam, FireWall by CleanTalk | cleantalk-spam-protect |
Unlimited Elements For Elementor (Free Widgets, Addons, Templates) | unlimited-elements-for-elementor |
WP Cookie Notice for GDPR, CCPA & ePrivacy Consent | gdpr-cookie-consent |
WP Mail Logging | wp-mail-logging |
WP Sticky Social | wp-sticky-social |
WP-Members Membership Plugin | wp-members |
WPBakery Page Builder for WordPress | js_composer |
WPForms Pro | wpforms |
WooCommerce Brands | woocommerce-brands |
WooCommerce Bulk Stock Management | woocommerce-bulk-stock-management |
WooCommerce PayPal Payments | woocommerce-paypal-payments |
WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo | woocommerce-payments |
WooCommerce Square | woocommerce-square |
WooCommerce Subscription | woocommerce-subscriptions |
WordPress Button Plugin MaxButtons | maxbuttons |
google-analytics-premium | google-analytics-premium |
tagDiv Cloud Library | td-cloud-library |
teachPress | teachpress |
Software Name | Software Slug |
---|---|
Balkon | balkon |
Newspaper - News & WooCommerce WordPress Theme | [newspaper](<https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/Newspaper - News & WooCommerce WordPress Theme>) |
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
Affected Software/s: Newspaper - News & WooCommerce WordPress Theme, tagDiv Cloud Library CVE ID: CVE-2023-1597 CVSS Score: 9.8 (Critical) Researcher/s: Truoc Phan Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/24e8d1a4-9853-4f60-a371-7fdbe86d554b>
Affected Software: MStore API CVE ID: CVE-2023-3197 CVSS Score: 9.8 (Critical) Researcher/s: Truoc Phan, An Đặng Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/30aab1af-a78f-4bac-b3c5-30ea854ccef7>
Affected Software: MStore API CVE ID: CVE-2022-47614 CVSS Score: 9.8 (Critical) Researcher/s: Lucio Sá Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/494c780d-5441-407d-8947-e56d7cac32d6>
Affected Software: MStore API CVE ID: CVE-2023-3076 CVSS Score: 9.8 (Critical) Researcher/s: Truoc Phan Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/7d1cc8c4-6c14-4d0c-9420-02d709f88b2f>
Affected Software: Booking Calendar | Appointment Booking | BookIt CVE ID: CVE-2023-2834 CVSS Score: 9.8 (Critical) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cfd32e46-a4fc-4c10-b546-9f9da75db791>
Affected Software: MStore API CVE ID: CVE-2023-3077 CVSS Score: 9.8 (Critical) Researcher/s: Truoc Phan Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/da36ba83-490e-4c9d-8a34-c5c79392a09a>
Affected Software: Quick Post Duplicator CVE ID: CVE-2023-2229 CVSS Score: 8.8 (High) Researcher/s: Marco Wotschka Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/34e31a0f-27de-4536-9a7e-b8f68e557b3f>
Affected Software: CMS Commander – Manage Multiple Sites CVE ID: CVE-2023-3325 CVSS Score: 8.1 (High) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1>
Affected Software: EventON CVE ID: CVE-2023-3219 CVSS Score: 7.5 (High) Researcher/s: Miguel Santareno Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1485dda6-bf83-4076-80c9-dc7ea9d58155>
Affected Software: Mailtree Log Mail CVE ID: CVE-2023-3135 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e>
Affected Software: Contact Form to DB by BestWebSoft – Messages Database Plugin For WordPress CVE ID: CVE-2023-36508 CVSS Score: 7.2 (High) Researcher/s: LEE SE HYOUNG Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b0e582e3-9ca3-4601-81f2-cb6ef827a468>
Affected Software: Colibri Page Builder CVE ID: CVE-2023-2188 CVSS Score: 7.2 (High) Researcher/s: Marco Wotschka Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c73d4b78-72aa-409a-a787-898179773b82>
Affected Software: PostX – Gutenberg Post Grid Blocks CVE ID: CVE-2023-36385 CVSS Score: 7.2 (High) Researcher/s: Le Ngoc Anh Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d0c9f4c5-a4f6-4cab-8531-5b88b3f347ea>
Affected Software: Mail Queue CVE ID: CVE-2023-3167 CVSS Score: 7.2 (High) Researcher/s: Alex Thomas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324>
Affected Software: Popup by Supsystic CVE ID: CVE-2023-3186 CVSS Score: 7.1 (High) Researcher/s: drwtsn Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/12acf651-6476-491b-84b3-afbc6c655b17>
Affected Software: Product Vendors CVE ID: CVE-2023-35879 CVSS Score: 6.6 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1388873f-8053-4ba9-8707-093bc0e8f2f5>
Affected Software: All In One Redirection CVE ID: CVE-2023-2493 CVSS Score: 6.6 (Medium) Researcher/s: Chien Vuong Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/360a022d-8530-48af-be34-77d6b4b5c19d>
Affected Software: HTTP Headers CVE ID: CVE-2023-1208 CVSS Score: 6.6 (Medium) Researcher/s: qerogram Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/75b84eae-6ff2-49af-a420-2aeef50224e3>
Affected Software: WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo CVE ID: CVE-2023-35915 CVSS Score: 6.6 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e1f0ec5c-6853-4df9-816a-1790f3dc86e0>
Affected Software: WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo CVE ID: CVE-2023-35916 CVSS Score: 6.5 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1811827d-88ae-45e0-a41e-d15fd0adf44a>
Affected Software: Form Builder | Create Responsive Contact Forms CVE ID: CVE-2023-23795 CVSS Score: 6.5 (Medium) Researcher/s: Rafshanzani Suhada Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1f8a69ba-2663-4c54-8aef-4c5b0f851186>
Affected Software: WooCommerce Subscription CVE ID: CVE-2023-35914 CVSS Score: 6.5 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a45a6b3d-49e1-4e25-aa66-15b396da8986>
Affected Software: Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress CVE ID: CVE-2023-36505 CVSS Score: 6.5 (Medium) Researcher/s: Theodoros Malachias Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e97479b1-06a0-4e24-9d2b-005bdfec9eaf>
Affected Software: Sermon'e – Sermons Online CVE ID: CVE-2023-35776 CVSS Score: 6.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0e1bfb29-80e7-4122-ab61-ef7c1dd8ebaa>
Affected Software: Lana Shortcodes CVE ID: CVE-2023-3372 CVSS Score: 6.4 (Medium) Researcher/s: Webbernaut Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/36806418-ae4e-4981-b9c5-dadb5e92e69a>
Affected Software: Social Share, Social Login and Social Comments Plugin – Super Socializer CVE ID: CVE-2023-35882 CVSS Score: 6.4 (Medium) Researcher/s: Rafshanzani Suhada Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/558679ea-a8ee-4329-8ad7-34b708476b53>
Affected Software: Enable SVG Uploads CVE ID: CVE-2023-2529 CVSS Score: 6.4 (Medium) Researcher/s: Mateus Machado Tesser Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/58354ce0-e166-431a-9fac-6c6d81e39e88>
Affected Software: WP Cookie Notice for GDPR, CCPA & ePrivacy Consent CVE ID: CVE-2023-23678 CVSS Score: 6.4 (Medium) Researcher/s: Rio Darmawan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5d178852-53bc-440b-8217-67ae68749349>
Affected Software: google-analytics-premium CVE ID: CVE-2023-32291 CVSS Score: 6.4 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/72c5d1b1-00bf-4352-b885-a8a7875c2bc6>
Affected Software: WPBakery Page Builder for WordPress CVE ID: CVE-2023-31213 CVSS Score: 6.4 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/78579ed9-1540-44be-9884-51fc2afec2bd>
Affected Software: Simple Iframe CVE ID: CVE-2023-2964 CVSS Score: 6.4 (Medium) Researcher/s: Jihoon Lee Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/810faad2-b63d-497c-af00-b57a07705608>
Affected Software: InventoryPress CVE ID: CVE-2023-2579 CVSS Score: 6.4 (Medium) Researcher/s: daniloalbuqrque Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/83603d33-b616-4332-aa05-b8ac61424614>
Affected Software: Lana Text to Image CVE ID: CVE-2023-3387 CVSS Score: 6.4 (Medium) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/8acb7893-85b2-404a-b3fe-b4c1a835b3eb>
Affected Software: WordPress Button Plugin MaxButtons CVE ID: CVE-2023-36503 CVSS Score: 6.4 (Medium) Researcher/s: Rafshanzani Suhada Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/af478e73-a2b8-468a-9075-9c1db1a97d7c>
Affected Software: Elementor Website Builder Pro CVE ID: CVE-2023-35050 CVSS Score: 6.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0cba362e-c1e3-4840-941f-b8af8469f771>
Affected Software: JS Help Desk – Best Help Desk & Support Plugin CVE ID: CVE-2023-23679 CVSS Score: 6.3 (Medium) Researcher/s: Fariq Fadillah Gusti Insani Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/594004eb-d32c-4b96-9afd-ae6470d9ddcc>
Affected Software: Spam protection, AntiSpam, FireWall by CleanTalk CVE ID: CVE-2023-33996 CVSS Score: 6.3 (Medium) Researcher/s: Rafshanzani Suhada Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/89dab433-91e9-4500-ab40-f4b500e66983>
Affected Software: Unlimited Elements For Elementor (Free Widgets, Addons, Templates) CVE ID: CVE-2023-31080 CVSS Score: 6.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9d49e28b-8b5e-4c67-a36d-c78ee33ffc6e>
Affected Software: Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress CVE ID: CVE Unknown CVSS Score: 6.1 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/041e635a-9f97-4f54-8ecb-57bbbc321cfc>
Affected Software: Export All URLs CVE ID: CVE-2023-3118 CVSS Score: 6.1 (Medium) Researcher/s: Christiaan Swiers Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/066c9327-6d72-41f9-895e-d14fe6471832>
Affected Software: Gravity Forms CVE ID: CVE-2023-2701 CVSS Score: 6.1 (Medium) Researcher/s: Fioravante Souza Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/234df0e5-d1be-4354-8bfc-761bed1e9aa9>
Affected Software: WooCommerce Bulk Stock Management CVE ID: CVE-2023-35918 CVSS Score: 6.1 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2f5d874a-d70e-4d3f-a9aa-d24707a3f7f4>
Affected Software/s: Complianz Premium – GDPR/CCPA Cookie Consent, Complianz – GDPR/CCPA Cookie Consent CVE ID: CVE-2023-33333 CVSS Score: 6.1 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/47941722-acaf-4f72-a64d-d01dc5e84adf>
Affected Software: Companion Sitemap Generator – HTML & XML CVE ID: CVE-2023-1780 CVSS Score: 6.1 (Medium) Researcher/s: Erwan LR Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4a9df582-0ead-45ff-aeaa-1bee9d470b41>
Affected Software: Five Star Restaurant Reservations – WordPress Booking Plugin CVE ID: CVE-2023-34017 CVSS Score: 6.1 (Medium) Researcher/s: yuyudhn Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6d420e73-24d5-4da8-8257-e0c7f0273031>
Affected Software: Booking Calendar Contact Form CVE ID: CVE-2023-36384 CVSS Score: 6.1 (Medium) Researcher/s: BOT Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9f4a3d17-d9fd-4ff4-a4b2-43030cdc7739>
Affected Software: WP Sticky Social CVE ID: CVE-2023-3320 CVSS Score: 6.1 (Medium) Researcher/s: Shunsuke Aoki Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313>
Affected Software: teachPress CVE ID: CVE-2023-36501 CVSS Score: 6.1 (Medium) Researcher/s: Le Ngoc Anh Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a33cc275-aa0d-4b8b-863a-6a32fac37512>
Affected Software/s: Contact Form by WPForms – Drag & Drop Form Builder for WordPress, WPForms Pro CVE ID: CVE-2023-30500 CVSS Score: 6.1 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b10303e0-c864-4088-91d1-d38c24094812>
Affected Software: Membership Plugin – Restrict Content CVE ID: CVE-2023-3182 CVSS Score: 6.1 (Medium) Researcher/s: Erwan LR Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cfbd41fa-15f0-473a-be5a-862e8a14b287>
Affected Software: Balkon CVE ID: CVE-2023-36502 CVSS Score: 6.1 (Medium) Researcher/s: FearZzZz Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cfcc1a4d-c6c7-4ca8-afe5-79298e7ad3d7>
Affected Software: MainWP Child – Securely Connects Sites to the MainWP WordPress Manager Dashboard CVE ID: CVE-2023-3132 CVSS Score: 5.9 (Medium) Researcher/s: Robert Lockwood Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414>
Affected Software: OOPSpam Anti-Spam CVE ID: CVE-2023-35913 CVSS Score: 5.4 (Medium) Researcher/s: Skalucy Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/479f7e9c-8918-4b87-b33d-a396276fb637>
Affected Software: Enable SVG, WebP & ICO Upload CVE ID: CVE-2023-2143 CVSS Score: 5.4 (Medium) Researcher/s: Mateus Machado Tesser Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6df7bd57-7d2f-4098-b2d0-ffb2e8ed5868>
Affected Software: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress CVE ID: CVE-2023-2517 CVSS Score: 5.4 (Medium) Researcher/s: Marco Wotschka Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ca66afc3-a749-4ddc-8e2f-959f65cebd45>
Affected Software: Greeklish-permalink CVE ID: CVE-2023-2495 CVSS Score: 5.3 (Medium) Researcher/s: Jonas Höbenreich Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3be0e82c-f9a8-42a5-9abb-24cc60e03944>
Affected Software: Gutenverse – Gutenberg Blocks – Page Builder for Site Editor CVE ID: CVE-2023-35875 CVSS Score: 5.3 (Medium) Researcher/s: Mika Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4c4e1d2c-bb20-40b7-90a3-96df68d083b8>
Affected Software: Membership Plugin – Restrict Content CVE ID: CVE Unknown CVSS Score: 5.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/79bb311d-d10d-4e4e-b690-84c0051b9911>
Affected Software: BBS e-Popup CVE ID: CVE-2023-36504 CVSS Score: 5.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/7ae5bbd0-2f95-41f3-a484-a9bb21b23b0e>
Affected Software: EventON CVE ID: CVE-2023-2796 CVSS Score: 5.3 (Medium) Researcher/s: Miguel Santareno Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dba3f3a6-3f55-4f4e-98e4-bb98d9c94bdd>
Affected Software: ReDi Restaurant Reservation CVE ID: CVE-2023-36510 CVSS Score: 5.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e7ebf975-0fa7-43cd-a4fe-99284ad3aaf6>
Affected Software: Core Web Vitals & PageSpeed Booster CVE ID: CVE-2023-35883 CVSS Score: 4.7 (Medium) Researcher/s: Le Ngoc Anh Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5fe374ff-85eb-4285-8d51-71e9275613cc>
Affected Software: Smoothscroller CVE ID: CVE-2023-23811 CVSS Score: 4.4 (Medium) Researcher/s: Rio Darmanwan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3aca1995-2408-423d-afb6-6cf452fbee37>
Affected Software: Float menu – awesome floating side menu CVE ID: CVE-2023-3225 CVSS Score: 4.4 (Medium) Researcher/s: Dipak Panchal Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5b6739b5-0df4-49b2-a655-4f0cff5886b7>
Affected Software: MojoPlug Slide Panel CVE ID: CVE-2023-23807 CVSS Score: 4.4 (Medium) Researcher/s: Rio Darmawan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/639a46b3-d19f-4ab4-995e-fd3de556b76e>
Affected Software: PrePost SEO CVE ID: CVE-2023-2029 CVSS Score: 4.4 (Medium) Researcher/s: Taurus Omar Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/93385acc-aede-4948-b64e-d1ab23167d17>
Affected Software: Extra User Details CVE ID: CVE-2023-35878 CVSS Score: 4.4 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a2362dea-8c4a-426f-9482-b7e19b8f5f4e>
Affected Software: Customer Service Software & Support Ticket System CVE ID: CVE Unknown CVSS Score: 4.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b27338c7-2fbc-4985-a25e-8e2a9fdef8c3>
Affected Software: About Me 3000 widget CVE ID: CVE-2023-3369 CVSS Score: 4.4 (Medium) Researcher/s: Marco Wotschka Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d>
Affected Software: Display Custom Fields – wpView CVE ID: CVE-2023-33213 CVSS Score: 4.4 (Medium) Researcher/s: Bae Song Hyun Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c4cad108-6574-4f14-8a37-89c4c10279d6>
Affected Software: AN_GradeBook CVE ID: CVE-2023-2709 CVSS Score: 4.4 (Medium) Researcher/s: Bob Matyas Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d574ed8b-2887-4a56-9fca-914148095ba1>
Affected Software: Image Protector CVE ID: CVE-2023-2026 CVSS Score: 4.4 (Medium) Researcher/s: Shreya Pohekar Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f8a2a23c-23bf-4f23-8b9d-1d6fe869d705>
Affected Software: Buy Me a Coffee – Button and Widget Plugin CVE ID: CVE-2023-2578 CVSS Score: 4.4 (Medium) Researcher/s: Felipe Restrepo Rodriguez Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f8f3ce3d-ae8a-4c0f-a74d-657225a932f1>
Affected Software: WooCommerce Square CVE ID: CVE-2023-35876 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0660d753-177e-419a-9e81-3ee2d08cfbc0>
Affected Software: WooCommerce PayPal Payments CVE ID: CVE-2023-35917 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1023edcb-9879-4dde-b62e-3ce65d7fef2f>
Affected Software/s: Complianz Premium – GDPR/CCPA Cookie Consent, Complianz – GDPR/CCPA Cookie Consent CVE ID: CVE-2023-34030 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/17ab4800-0afd-4c39-970a-bd8dcc6a8b93>
Affected Software: MyCurator Content Curation CVE ID: CVE-2023-32104 CVSS Score: 4.3 (Medium) Researcher/s: Nguyen Xuan Chien Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3301899e-5c38-4ecd-b095-6e00b0f7582e>
Affected Software: Extra User Details CVE ID: CVE-2023-35877 CVSS Score: 4.3 (Medium) Researcher/s: LEE SE HYOUNG Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/81463022-c075-40e8-962d-b2ca27fd4f70>
Affected Software: Gallery Metabox CVE ID: CVE-2023-2562 CVSS Score: 4.3 (Medium) Researcher/s: Marco Wotschka Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f>
Affected Software: Potent Donations for WooCommerce CVE ID: CVE-2023-35912 CVSS Score: 4.3 (Medium) Researcher/s: qilin_99 Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/98358366-7cb0-40ae-a931-10985c916af1>
Affected Software: WooCommerce Brands CVE ID: CVE-2023-35880 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a26a6f28-4a7f-421d-a69e-2afbe1367106>
Affected Software: WP-Members Membership Plugin CVE ID: CVE-2023-2869 CVSS Score: 4.3 (Medium) Researcher/s: Marco Wotschka Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dabc2ae0-6005-4287-b1b0-385bc6d5c467>
Affected Software: WP Mail Logging CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/de00d13b-fab9-4284-9594-abd000fbb7ef>
Affected Software: Gallery Metabox CVE ID: CVE-2023-2561 CVSS Score: 4.3 (Medium) Researcher/s: Marco Wotschka Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395>
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (June 19, 2023 to June 25, 2023) appeared first on Wordfence.