Last week, there were 64 vulnerabilities disclosed in 66 WordPress Plugins and 3 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 32 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
_Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.
Patch Status | Number of Vulnerabilities |
---|---|
Unpatched | 34 |
Patched | 30 |
Severity Rating | Number of Vulnerabilities |
---|---|
Low Severity | 2 |
Medium Severity | 54 |
High Severity | 6 |
Critical Severity | 2 |
Vulnerability Type by CWE | Number of Vulnerabilities |
---|---|
Missing Authorization | 18 |
Cross-Site Request Forgery (CSRF) | 18 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | 16 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | 3 |
Server-Side Request Forgery (SSRF) | 2 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') | 1 |
Authorization Bypass Through User-Controlled Key | 1 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') | 1 |
Improper Authorization | 1 |
Protection Mechanism Failure | 1 |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') | 1 |
Use of Hard-coded Cryptographic Key | 1 |
Researcher Name | Number of Vulnerabilities |
---|---|
Abdi Pranata | 7 |
Mika | 7 |
Rafie Muhammad | 5 |
Skalucy | 3 |
Lana Codes | |
(Wordfence Vulnerability Researcher) | 3 |
longxi | 3 |
Nguyen Xuan Chien | 2 |
yuyudhn | 2 |
Dipak Panchal | 2 |
Chloe Chamberland | |
(Wordfence Vulnerability Researcher) | 2 |
Junsu Yeo | 1 |
Cat | 1 |
TaeEun Lee | 1 |
Emili Castells | 1 |
Truoc Phan | 1 |
konagash | 1 |
Dmitriy | 1 |
Christiaan Swiers | 1 |
Stephen | 1 |
Muhammad Daffa | 1 |
LOURCODE | 1 |
Bob Matyas | 1 |
Yuchen Ji | 1 |
Phd | 1 |
Muhamad Arsyad | 1 |
Marco Wotschka | |
(Wordfence Vulnerability Researcher) | 1 |
Jonas Höbenreich | 1 |
Marc-Alexandre Montpas | 1 |
Rio Darmawan | 1 |
PetiteMais | 1 |
LEE SE HYOUNG | 1 |
thiennv | 1 |
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.
Software Name | Software Slug |
---|---|
ACF Photo Gallery Field | navz-photo-gallery |
AGP Font Awesome Collection | agp-font-awesome-collection |
APIExperts Square for WooCommerce | woosquare |
Assistant – Every Day Productivity Apps | assistant |
Author Box for Authors, Co-Authors, Multiple Authors and Guest Authors – Molongui | molongui-authorship |
Backup Migration | backup-backup |
Banner Management For WooCommerce | banner-management-for-woocommerce |
Blog2Social: Social Media Auto Post & Scheduler | blog2social |
Booster Elementor Addons | booster-for-elementor |
Change WP Admin Login | change-wp-admin-login |
Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget | bit-assist |
Church Admin | church-admin |
Clone | wp-clone-by-wp-academy |
CodeBard's Patron Button and Widgets for Patreon | patron-button-and-widgets-by-codebard |
Contact Form Builder by Bit Form – Easiest Contact Form, Payment Form, Order Form, Calculator Form Builder Plugin for WordPress | bit-form |
Custom Field For WP Job Manager | custom-field-for-wp-job-manager |
Custom Field Template | custom-field-template |
Discussion Board – WordPress Forum Plugin | wp-discussion-board |
Donations Made Easy – Smart Donations | smart-donations |
Duplicate Post | copy-delete-posts |
Enhanced Text Widget | enhanced-text-widget |
Fraud Prevention For Woocommerce | woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers |
Google Map Shortcode | google-map-shortcode |
HTTP Auth | http-auth |
InstaWP Connect – 1-click WP Staging & Migration (beta) | instawp-connect |
Instant CSS | instant-css |
LWS Affiliation | lws-affiliation |
Local Development | local-development |
Meks Smart Social Widget | meks-smart-social-widget |
Mobile Address Bar Changer | mobile-address-bar-changer |
MultiParcels Shipping For WooCommerce | multiparcels-shipping-for-woocommerce |
Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress | ninja-forms |
Optimize Database after Deleting Revisions | rvg-optimize-database |
Perelink Pro | perelink |
Pop-up | pop-up-pop-up |
Post to Google My Business (Google Business Profile) | post-to-google-my-business |
QR code MeCard/vCard generator | wp-qrcode-me-v-card |
Quasar form free – Contact Form Builder for WordPress | quasar-form |
RSS Redirect & Feedburner Alternative | feedburner-alternative-and-rss-redirect |
Redirection | redirect-redirection |
Remove Duplicate Posts | remove-duplicate-posts |
SSL Mixed Content Fix | http-https-remover |
Saphali Woocommerce Lite | saphali-woocommerce-lite |
Schema Pro | wp-schema-pro |
Simple Author Box | simple-author-box |
Simple Googlebot Visit | simple-googlebot-visit |
Simple Wp Sitemap | simple-wp-sitemap |
Slider Carousel – Responsive Image Slider | slider-images |
Social Media Share Buttons & Social Sharing Icons | ultimate-social-media-icons |
Social Share Icons & Social Share Buttons | ultimate-social-media-plus |
Taboola | taboola |
The Events Calendar | the-events-calendar |
Ultimate Posts Widget | ultimate-posts-widget |
Update Theme and Plugins from Zip File | update-theme-and-plugins-from-zip-file |
User Activity Log | user-activity-log |
User Email Verification for WooCommerce | woo-confirmation-email |
Video Conferencing with Zoom | video-conferencing-with-zoom-api |
WP Clone Menu | clone-menu |
WP Quick Post Duplicator | wp-quick-post-duplicator |
WPS Limit Login | wps-limit-login |
Web Accessibility By accessiBe | accessibe |
WordPress Database Administrator | wp-database-admin |
cartflows-pro | cartflows-pro |
tagDiv Composer | td-composer |
wp tell a friend popup form | wp-tell-a-friend-popup-form |
wpml-string-translation | wpml-string-translation |
Software Name | Software Slug |
---|---|
nsc | nsc |
winters | winters |
yourjourney | yourjourney |
Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.
Affected Software: InstaWP Connect – 1-click WP Staging & Migration (beta) CVE ID: CVE-2023-3956 CVSS Score: 9.8 (Critical) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b>
Affected Software: LWS Affiliation CVE ID: CVE-2023-32297 CVSS Score: 9.8 (Critical) Researcher/s: Marco Wotschka, Jonas Höbenreich Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a7b1871d-9d26-4bdc-bd20-0535143902d4>
Affected Software: Quasar form free – Contact Form Builder for WordPress CVE ID: CVE-2023-35910 CVSS Score: 8.8 (High) Researcher/s: Emili Castells Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/150021d3-71bb-41c0-bb1c-5843e94ec0b6>
Affected Software: User Activity Log CVE ID: CVE-2023-3435 CVSS Score: 7.5 (High) Researcher/s: Marc-Alexandre Montpas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b4ca985e-cae1-4e26-ad2d-413724cfd45d>
Affected Software: WordPress Database Administrator CVE ID: CVE-2023-3211 CVSS Score: 7.2 (High) Researcher/s: Christiaan Swiers Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2c314acf-d5bb-433a-8e2d-4ca333944bb6>
Affected Software: wpml-string-translation CVE ID: CVE Unknown CVSS Score: 7.2 (High) Researcher/s: Stephen Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2e8f224c-cd22-4926-be24-9da2f22afa50>
Affected Software: MultiParcels Shipping For WooCommerce CVE ID: CVE Unknown CVSS Score: 7.2 (High) Researcher/s: Unknown Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c5ce2d08-6e01-4a7c-a2d5-ba98639107a8>
Affected Software: Author Box for Authors, Co-Authors, Multiple Authors and Guest Authors – Molongui CVE ID: CVE-2023-39164 CVSS Score: 7.2 (High) Researcher/s: LEE SE HYOUNG Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cff04656-5930-4324-9ddf-43a2166cdf04>
Affected Software: Booster Elementor Addons CVE ID: CVE-2023-38480 CVSS Score: 6.5 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/60ee9cfc-016d-45ee-b3f4-da999d093776>
Affected Software: Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress CVE ID: CVE-2023-37979 CVSS Score: 6.1 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/1460dc44-dd64-4fd6-952b-1f5d4285bfa4>
Affected Software: tagDiv Composer CVE ID: CVE-2023-39166 CVSS Score: 6.1 (Medium) Researcher/s: Truoc Phan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/199d3a1f-bfde-4081-bb68-ebb6f9d360b2>
Affected Software: User Email Verification for WooCommerce CVE ID: CVE-2023-39162 CVSS Score: 6.1 (Medium) Researcher/s: Nguyen Xuan Chien Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/282ef0bb-4db5-4b07-9aad-b128e8fdb915>
Affected Software: CodeBard's Patron Button and Widgets for Patreon CVE ID: CVE-2023-30491 CVSS Score: 6.1 (Medium) Researcher/s: LOURCODE Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/46f5d1fa-dba7-4882-be29-39dc281d7278>
Affected Software: nsc CVE ID: CVE-2023-3965 CVSS Score: 6.1 (Medium) Researcher/s: longxi Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2>
Affected Software: winters CVE ID: CVE-2023-3962 CVSS Score: 6.1 (Medium) Researcher/s: longxi Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3>
Affected Software: Custom Field Template CVE ID: CVE-2023-38392 CVSS Score: 6.1 (Medium) Researcher/s: Phd Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/752a07c4-ae88-4152-b449-68228a54604a>
Affected Software: Blog2Social: Social Media Auto Post & Scheduler CVE ID: CVE Unknown CVSS Score: 6.1 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a00147db-2ca5-4290-ae13-27be6119b751>
Affected Software: AGP Font Awesome Collection CVE ID: CVE-2023-30481 CVSS Score: 6.1 (Medium) Researcher/s: Skalucy Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b4df1fc3-ea7e-4f41-a5f0-d3928f8add70>
Affected Software: yourjourney CVE ID: CVE-2023-3933 CVSS Score: 6.1 (Medium) Researcher/s: longxi Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935>
Affected Software: Church Admin CVE ID: CVE-2023-38515 CVSS Score: 5.5 (Medium) Researcher/s: Yuchen Ji Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6ff53647-572f-419f-ad39-965658a10263>
Affected Software: Assistant – Every Day Productivity Apps CVE ID: CVE Unknown CVSS Score: 5.5 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9d5ed6cf-ae12-4da5-809f-6a8c61eeb4f6>
Affected Software: WP Quick Post Duplicator CVE ID: CVE-2023-31214 CVSS Score: 5.4 (Medium) Researcher/s: TaeEun Lee Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/12a576ee-f8a9-4740-b87b-091a46970d53>
Affected Software: Discussion Board – WordPress Forum Plugin CVE ID: CVE-2023-39161 CVSS Score: 5.4 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2e9d7776-aa96-47c8-9e31-5484ab65bc66>
Affected Software: wp tell a friend popup form CVE ID: CVE-2023-25463 CVSS Score: 5.4 (Medium) Researcher/s: yuyudhn Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2f760821-98d4-4154-a4ae-861283f991f8>
Affected Software: HTTP Auth CVE ID: CVE-2023-27435 CVSS Score: 5.4 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/43357daa-4dce-4851-b41b-48d3ffb8a387>
Affected Software: Schema Pro CVE ID: CVE-2023-36683 CVSS Score: 5.4 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/645ab4b9-e421-4610-b99b-960a7fbb7779>
Affected Software: Saphali Woocommerce Lite CVE ID: CVE-2023-25788 CVSS Score: 5.4 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c58d9011-a082-48ca-b702-ef5563af2c66>
Affected Software: WP Clone Menu CVE ID: CVE-2023-38395 CVSS Score: 5.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0bbbefce-4451-410d-bc19-f489318dda4a>
Affected Software: APIExperts Square for WooCommerce CVE ID: CVE-2022-47182 CVSS Score: 5.3 (Medium) Researcher/s: Cat Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0e1193b1-6e5a-4ecc-ae97-1a3129ad330e>
Affected Software: Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress CVE ID: CVE-2023-38386 CVSS Score: 5.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6551eea6-1059-4caa-876c-3d08083130f6>
Affected Software: Change WP Admin Login CVE ID: CVE-2023-3604 CVSS Score: 5.3 (Medium) Researcher/s: Muhamad Arsyad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9410b5b8-1bb2-42d7-8d4d-721131d392e3>
Affected Software: Instant CSS CVE ID: CVE-2023-38483 CVSS Score: 5.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b82a9ae8-ff82-40bf-a5d4-5175daab9146>
Affected Software: Slider Carousel – Responsive Image Slider CVE ID: CVE-2023-25457 CVSS Score: 5.3 (Medium) Researcher/s: Rio Darmawan Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c32f1c6a-cf65-419e-bfcd-48ac8e3735bc>
Affected Software: Meks Smart Social Widget CVE ID: CVE Unknown CVSS Score: 5.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/eaabaadf-7881-4c4f-8987-fbba8318a458>
Affected Software: Custom Field For WP Job Manager CVE ID: CVE-2023-3328 CVSS Score: 4.4 (Medium) Researcher/s: Bob Matyas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4f504434-2de9-4d2e-848d-6c7fc0880672>
Affected Software: Contact Form Builder by Bit Form – Easiest Contact Form, Payment Form, Order Form, Calculator Form Builder Plugin for WordPress CVE ID: CVE-2023-3645 CVSS Score: 4.4 (Medium) Researcher/s: Dipak Panchal Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9cb6384a-f9dc-454c-be39-c2c681e57d36>
Affected Software: Web Accessibility By accessiBe CVE ID: CVE Unknown CVSS Score: 4.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9d79ce22-33ef-4dfb-a842-591cd7cedc94>
Affected Software: wp tell a friend popup form CVE ID: CVE-2023-25465 CVSS Score: 4.4 (Medium) Researcher/s: yuyudhn Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ec860ad9-7054-4ed2-a8f2-6589e4db36cd>
Affected Software: Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget CVE ID: CVE-2023-3667 CVSS Score: 4.4 (Medium) Researcher/s: Dipak Panchal Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/fb88e629-6811-4651-99b9-7394e4a787b6>
Affected Software: Remove Duplicate Posts CVE ID: CVE-2023-29237 CVSS Score: 4.3 (Medium) Researcher/s: Junsu Yeo Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/02dcf609-e8ef-4ff5-a61e-6c513af04ca2>
Affected Software: Donations Made Easy – Smart Donations CVE ID: CVE-2023-38475 CVSS Score: 4.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0efebdcb-c3fb-435a-8687-6abdd5f9334b>
Affected Software: Banner Management For WooCommerce CVE ID: CVE-2023-39158 CVSS Score: 4.3 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/223a6c35-712a-458c-8708-6981c9041fe1>
Affected Software: Simple Author Box CVE ID: CVE-2023-3601 CVSS Score: 4.3 (Medium) Researcher/s: Dmitriy Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2a1b7e37-1e30-473c-aadc-176de729e619>
Affected Software: Mobile Address Bar Changer CVE ID: CVE-2023-38390 CVSS Score: 4.3 (Medium) Researcher/s: Skalucy Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/2f1b0b50-663f-40ff-803e-a20d7c7ea980>
Affected Software: Meks Smart Social Widget CVE ID: CVE-2023-25989 CVSS Score: 4.3 (Medium) Researcher/s: Muhammad Daffa Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3d0efe1d-69ad-483c-b200-38873f88433b>
Affected Software: Simple Wp Sitemap CVE ID: CVE-2023-24380 CVSS Score: 4.3 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3e3dc509-73c3-4869-b520-6f5c1d691184>
Affected Software: Optimize Database after Deleting Revisions CVE ID: CVE-2023-25980 CVSS Score: 4.3 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5d01548e-91bf-44db-83dc-10c7d5962f9b>
Affected Software: Perelink Pro CVE ID: CVE-2023-37990 CVSS Score: 4.3 (Medium) Researcher/s: Skalucy Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/65b9fea3-323a-4123-ad83-3d713eb5552f>
Affected Software: ACF Photo Gallery Field CVE ID: CVE-2023-3957 CVSS Score: 4.3 (Medium) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/689511e0-1355-4fcb-8a72-d819abc8e9a3>
Affected Software: QR code MeCard/vCard generator CVE ID: CVE-2023-38477 CVSS Score: 4.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/8896fa5a-1642-4fcd-8fff-1e5828c28523>
Affected Software: Taboola CVE ID: CVE-2023-38398 CVSS Score: 4.3 (Medium) Researcher/s: Nguyen Xuan Chien Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ab015cb4-0b1e-40ff-ab9b-6c03eed3142f>
Affected Software/s: SSL Mixed Content Fix, Duplicate Post, Social Share Icons & Social Share Buttons, Ultimate Posts Widget, Backup Migration, Pop-up, Redirection, Clone, Social Media Share Buttons & Social Sharing Icons, RSS Redirect & Feedburner Alternative, Enhanced Text Widget CVE ID: CVE-2023-3977 CVSS Score: 4.3 (Medium) Researcher/s: Chloe Chamberland Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc>
Affected Software: Simple Googlebot Visit CVE ID: CVE-2023-38479 CVSS Score: 4.3 (Medium) Researcher/s: Abdi Pranata Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b1e7bb04-28b4-407c-910b-e37a7e26682e>
Affected Software: Post to Google My Business (Google Business Profile) CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/baa8e48f-769a-4f48-bc47-d55c179d1ca1>
Affected Software: The Events Calendar CVE ID: CVE-2023-35777 CVSS Score: 4.3 (Medium) Researcher/s: PetiteMais Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c513e674-c027-4335-8ba3-b19696a1ce9b>
Affected Software/s: SSL Mixed Content Fix, Duplicate Post, Social Share Icons & Social Share Buttons, Ultimate Posts Widget, Backup Migration, Pop-up, Redirection, Clone, Social Media Share Buttons & Social Sharing Icons, RSS Redirect & Feedburner Alternative, Enhanced Text Widget CVE ID: CVE-2023-0958 CVSS Score: 4.3 (Medium) Researcher/s: Chloe Chamberland Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3>
Affected Software: cartflows-pro CVE ID: CVE-2023-36685 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d0631ec9-fb72-4573-a41b-9b6b01aeaae9>
Affected Software: Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress CVE ID: CVE-2023-38393 CVSS Score: 4.3 (Medium) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/d7befdf6-07d7-42c9-876a-abb8f8f9c3df>
Affected Software: Google Map Shortcode CVE ID: CVE-2023-38396 CVSS Score: 4.3 (Medium) Researcher/s: thiennv Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e3f05af5-35f5-4813-b8a3-bb90709af677>
Affected Software: Update Theme and Plugins from Zip File CVE ID: CVE-2023-25489 CVSS Score: 4.3 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/e59293a6-cc61-4913-9ed0-13fa16299705>
Affected Software: Fraud Prevention For Woocommerce CVE ID: CVE-2023-39159 CVSS Score: 4.3 (Medium) Researcher/s: Mika Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f4f84b2a-2674-42a1-9db1-d9c1f3db2376>
Affected Software: Local Development CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f962a3ef-205d-42e2-acf1-45eabfdba3ee>
Affected Software: WPS Limit Login CVE ID: CVE-2023-39160 CVSS Score: 3.7 (Low) Researcher/s: konagash Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/298b31e4-739e-424e-918f-77092148a6bb>
Affected Software: Video Conferencing with Zoom CVE ID: CVE-2023-3947 CVSS Score: 3.7 (Low) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ba2515d9-ced0-4b49-87c4-04c8391c2608>
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
The post Wordfence Intelligence Weekly WordPress Vulnerability Report (July 24, 2023 to July 30, 2023) appeared first on Wordfence.