Lucene search

K
wordfenceChloe ChamberlandWORDFENCE:FC9E4C7F7F6FDE6E5E84F231807FB449
HistoryAug 10, 2023 - 12:42 p.m.

Wordfence Intelligence Weekly WordPress Vulnerability Report (July 31, 2023 to August 6, 2023)

2023-08-1012:42:18
Chloe Chamberland
www.wordfence.com
24
wordfence
wordpress
vulnerability
report
plugins
themes
database
security
researchers
firewall
protection
api
mailing list

0.002 Low

EPSS

Percentile

55.0%

Last week, there were 29 vulnerabilities disclosed in 24 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 18 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

_Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Unpatched 2
Patched 27

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Low Severity 0
Medium Severity 19
High Severity 7
Critical Severity 3

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 11
Improper Privilege Management 4
Cross-Site Request Forgery (CSRF) 3
Improper Control of Generation of Code ('Code Injection') 3
Missing Authorization 2
Information Exposure 2
Authentication Bypass Using an Alternate Path or Channel 1
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 1
Use of Less Trusted Source 1
Unrestricted Upload of File with Dangerous Type 1

Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
Lana Codes
(Wordfence Vulnerability Researcher) 5
Dmitriy 1
DoYeon Park 1
Bob Matyas 1
Marc-Alexandre Montpas 1
Rafie Muhammad 1
Dmitrii Ignatyev 1
Erwan LR 1
Daniel Ruf 1
MyungJu Kim 1
Pallab Jyoti Borah 1
Sayandeep Dutta 1
Vikas Kumawat 1
Satoo Nakano 1
Ryotaro Imamura 1
Vincenzo Turturro 1
Gianluca Parisi 1
Vincenzo Cantatore 1

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Advanced Custom Fields (ACF) advanced-custom-fields
Booster for WooCommerce woocommerce-jetpack
Bus Ticket Booking with Seat Reservation bus-ticket-booking-with-seat-reservation
Duplicate Post copy-delete-posts
FormCraft – Contact Form Builder for WordPress formcraft-form-builder
Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor front-editor
Import All Pages, Post types, Products, Orders, and Users as XML & CSV wp-ultimate-csv-importer
JetElements jet-elements
Media from FTP media-from-ftp
MultiParcels Shipping For WooCommerce multiparcels-shipping-for-woocommerce
Order Delivery Date for WooCommerce order-delivery-date-for-woocommerce
PostX – Gutenberg Post Grid Blocks ultimate-post
Shop as a Customer for WooCommerce shop-as-a-customer-for-woocommerce
Short URL shorten-url
Simple Blog Card simple-blog-card
Simple Share Follow Button simple-share-follow-button
Simple Ticker simple-ticker
Stripe Payment Plugin for WooCommerce payment-gateway-stripe-and-woocommerce-integration
Subscribers Text Counter subscribers-text-counter
TI WooCommerce Wishlist ti-woocommerce-wishlist
Upload Media By URL upload-media-by-url
User Access Manager user-access-manager
WordPress Job Board and Recruitment Plugin – JobWP jobwp
wpShopGermany – Protected Shops wpshopgermany-protectedshops

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.

Stripe Payment Plugin for WooCommerce <= 3.7.7 - Authentication Bypass

Affected Software: Stripe Payment Plugin for WooCommerce CVE ID: CVE-2023-3162 CVSS Score: 9.8 (Critical) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7b&gt;


TI WooCommerce Wishlist <= 2.7.3 - Unauthenticated Blind SQL Injection via Rest API

Affected Software: TI WooCommerce Wishlist CVE ID: CVE Unknown CVSS Score: 9.8 (Critical) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/82420667-9ba6-46ed-9a53-d16850755bb9&gt;


WordPress Job Board and Recruitment Plugin – JobWP <= 2.0 - Arbitrary File Upload via 'jobwp_upload_resume'

Affected Software: WordPress Job Board and Recruitment Plugin – JobWP CVE ID: CVE-2023-29384 CVSS Score: 9.8 (Critical) Researcher/s: MyungJu Kim Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/88f4c567-eb57-4f98-afdc-65f8863b90c3&gt;


Shop as a Customer for WooCommerce <= 1.2.3 - Authenticated (Shop Manager+) Privilege Escalation

Affected Software: Shop as a Customer for WooCommerce CVE ID: CVE Unknown CVSS Score: 8.8 (High) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/3c730a69-015a-4b36-aa16-eff6916a302f&gt;


Shop as a Customer for WooCommerce <= 1.1.7 - Authenticated (Subscriber+) Privilege Escalation

Affected Software: Shop as a Customer for WooCommerce CVE ID: CVE Unknown CVSS Score: 8.8 (High) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6d041edb-70f3-4894-8a78-f6881541054c&gt;


JetElements <= 2.6.10 - Authenticated (Contributor+) Remote Code Execution

Affected Software: JetElements CVE ID: CVE-2023-39157 CVSS Score: 8.8 (High) Researcher/s: Rafie Muhammad Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/73fca37e-c6cf-420c-b984-3ef89acf3216&gt;


WP Ultimate CSV Importer <= 7.9.8 - Authenticated (Author+) PHP File Creation to Remote Code Execution

Affected Software: Import All Pages, Post types, Products, Orders, and Users as XML & CSV CVE ID: CVE-2023-4141 CVSS Score: 8 (High) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/b4fe8b1f-da1c-4f94-9ab4-272766b488c3&gt;


WP Ultimate CSV Importer <= 7.9.8 - Authenticated (Author+) Remote Code Execution

Affected Software: Import All Pages, Post types, Products, Orders, and Users as XML & CSV CVE ID: CVE-2023-4142 CVSS Score: 8 (High) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/db1bad2e-55df-40c5-9a3f-651858a19b42&gt;


WP Ultimate CSV Importer <= 7.9.8 - Sensitive Information Exposure via Directory Listing

Affected Software: Import All Pages, Post types, Products, Orders, and Users as XML & CSV CVE ID: CVE-2023-4139 CVSS Score: 7.5 (High) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/6404476e-0c32-4f8e-882f-6a1785ba5748&gt;


Booster for WooCommerce 7.0.0 - Authenticated (Shop Manager+) Missing Authorization to Arbitrary Options Update

Affected Software: Booster for WooCommerce CVE ID: CVE Unknown CVSS Score: 7.2 (High) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/0903bd2b-240f-4791-bfa6-f727d193af4a&gt;


WP Ultimate CSV Importer <= 7.9.8 - Arbitrary Usermeta Update to Authenticated (Author+) Privilege Escalation

Affected Software: Import All Pages, Post types, Products, Orders, and Users as XML & CSV CVE ID: CVE-2023-4140 CVSS Score: 6.6 (Medium) Researcher/s: Lana Codes Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5fdba41f-daa5-44e8-bc47-aa8b7bd31054&gt;


Upload Media By URL <= 1.0.7 - Cross-Site Request Forgery via 'umbu_download'

Affected Software: Upload Media By URL CVE ID: CVE-2023-3720 CVSS Score: 6.5 (Medium) Researcher/s: Dmitriy Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/18a0b8f2-4512-46a5-92a6-66d375c986dd&gt;


Simple Ticker <= 3.05 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Simple Ticker CVE ID: CVE Unknown CVSS Score: 6.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/162595bb-d41b-4dfd-bfda-3a1e5794eaaf&gt;


Simple Blog Card <= 1.30 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Simple Blog Card CVE ID: CVE-2023-4035 CVSS Score: 6.4 (Medium) Researcher/s: Dmitrii Ignatyev Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/78f6d878-6ba8-4d80-9c9b-1a363d6aaed5&gt;


Simple Share Follow Button <= 1.03 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Simple Share Follow Button CVE ID: CVE Unknown CVSS Score: 6.4 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ed98d335-16f9-4be8-bace-06e2b5db4cb9&gt;


Media from FTP <= 11.15 - Improper Privilege Management

Affected Software: Media from FTP CVE ID: CVE Unknown CVSS Score: 6.3 (Medium) Researcher/s: Marc-Alexandre Montpas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5f9cf9c5-d836-4414-a53f-adee2784bd96&gt;


Duplicate Post <= 1.4.1 - Cross-Site Request Forgery via 'cdp_action_handling' AJAX action

Affected Software: Duplicate Post CVE ID: CVE Unknown CVSS Score: 6.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a8c8d839-d2a4-4b2a-ad61-a3cda7826636&gt;


PostX - Gutenberg Post Grid Blocks <= 3.0.5 - Reflected Cross-Site Scripting via 'postx_type'

Affected Software: PostX – Gutenberg Post Grid Blocks CVE ID: CVE-2023-3992 CVSS Score: 6.1 (Medium) Researcher/s: Bob Matyas Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/5ab2e2ae-6f46-4815-a2d2-407767bfaba8&gt;


MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting

Affected Software: MultiParcels Shipping For WooCommerce CVE ID: CVE-2023-3954 CVSS Score: 6.1 (Medium) Researcher/s: Erwan LR Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/83a3f61c-2385-456f-bca3-6d3f3ffd9694&gt;


Order Delivery Date for WooCommerce <= 3.20.0 - Reflected Cross-Site Scripting via 'orddd_lite_custom_startdate' and 'orddd_lite_custom_enddate'

Affected Software: Order Delivery Date for WooCommerce CVE ID: CVE Unknown CVSS Score: 6.1 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/9719d083-cc7c-4655-a4c4-f5370cfe76e0&gt;


Short URL <= 1.6.7 - Missing Authorization via multiple AJAX functions

Affected Software: Short URL CVE ID: CVE Unknown CVSS Score: 6.1 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dcd05142-9700-46a8-9ca6-f85e81dfee0d&gt;


Bus Ticket Booking with Seat Reservation <= 5.2.3 - Reflected Cross-Site Scripting

Affected Software: Bus Ticket Booking with Seat Reservation CVE ID: CVE-2023-4067 CVSS Score: 6.1 (Medium) Researcher/s: Vincenzo Turturro, Gianluca Parisi, Vincenzo Cantatore Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/ff2855cb-e4a8-4412-af24-4cee03ae2d43&gt;


User Access Manager <= 2.2.16 - IP Spoofing

Affected Software: User Access Manager CVE ID: CVE-2022-1601 CVSS Score: 5.3 (Medium) Researcher/s: Daniel Ruf Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/88c5752c-ef4e-4343-810e-ecf1f33d3538&gt;


wpShopGermany - Protected Shops <= 2.0 - Authenticated(Administrator+) Stored Cross-Site Scripting

Affected Software: wpShopGermany – Protected Shops CVE ID: CVE-2023-39919 CVSS Score: 4.4 (Medium) Researcher/s: DoYeon Park Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/21cc5aec-ab5f-412b-aed0-bb41584a84cf&gt;


FormCraft <= 1.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting

Affected Software: FormCraft – Contact Form Builder for WordPress CVE ID: CVE-2023-3501 CVSS Score: 4.4 (Medium) Researcher/s: Sayandeep Dutta Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/c17967a4-20df-4b23-973f-591a0caeea39&gt;


Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor <= 4.0.4 - Authenticated(Administrator+) Stored Cross-Site Scripting

Affected Software: Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor CVE ID: CVE-2023-1982 CVSS Score: 4.4 (Medium) Researcher/s: Vikas Kumawat Patch Status: Unpatched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/dfea441c-2e77-47fa-8f6e-8d17d0c90ebe&gt;


Advanced Custom Fields <= 6.1.7 - Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Advanced Custom Fields (ACF) CVE ID: CVE Unknown CVSS Score: 4.4 (Medium) Researcher/s: Satoo Nakano, Ryotaro Imamura Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/f412bdb0-953d-4375-85c2-b87f3aa77d60&gt;


Simple Blog Card <= 1.31 - Sensitive Information Exposure

Affected Software: Simple Blog Card CVE ID: CVE Unknown CVSS Score: 4.3 (Medium) Researcher/s: Unknown Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/36cec19a-4631-4ada-b37a-f4b2dc264096&gt;


Subscribers Text Counter <= 1.7 - Cross-Site Request Forgery to Settings Update and Cross-Site Scripting

Affected Software: Subscribers Text Counter CVE ID: CVE-2023-3356 CVSS Score: 4.3 (Medium) Researcher/s: Pallab Jyoti Borah Patch Status: Patched Vulnerability Details: <https://wordfence.com/threat-intel/vulnerabilities/id/a548e71f-4f36-4a29-8293-474e119f09cc&gt;


As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (July 31, 2023 to August 6, 2023) appeared first on Wordfence.

0.002 Low

EPSS

Percentile

55.0%

Related for WORDFENCE:FC9E4C7F7F6FDE6E5E84F231807FB449