Wordfence Intelligence Weekly WordPress Vulnerability Report (April 8, 2024 to April 14, 2024)
🎉 Did you know we’re running a Bug Bounty Extravaganza again?
Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure!
Last week, there were 202 vulnerabilities disclosed in 185 WordPress Plugins, 21 WordPress Themes, and one in WordPress Core that have been added to the Wordfence Intelligence Vulnerability Database, and there were 63 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API, webhook integration, and Wordfence CLI Vulnerability Scanner are all completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.
Enterprises, Hosting Providers, and even Individuals can use the Wordfence CLI Vulnerability Scanner to run regular vulnerability scans across the sites they protect. Or alternatively, utilize the vulnerability Database API to receive a complete dump of our database of over 15,000 vulnerabilities and then utilize the webhook integration to stay on top of the newest vulnerabilities added in real-time, as well as any updates made to the database, all for free.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
New Firewall Rules Deployed Last Week
The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:
- Forminator – Contact Form, Payment Form & Custom Form Builder
Gutenberg 12.9.0 – 18.0.0 – Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block
6.4
CVSS Rating
Medium (6.4)CVE-ID
UnknownPatch Status
PatchedPublished
Apr 9, 2024Affected Software
GutenbergResearchers
John Blackbourn stealthcopterMore Details>
Multiple Themes (Various Versions) – Cross-Site Request Forgery to Notice Dismissal
4.3
CVSS Rating
Medium (4.3)CVE-ID
CVE-2024-31386Patch Status
PatchedPublished
Apr 10, 2024Affected Software
Sliding Door
CityLogic
Lightning
i-max
Default Mag
Shopstar!
HappenStance
Emmet Lite
X-T9
i-excel
and 5 more…Researcher
Dhabaleshwar DasMore Details>
Newsletter
NewsXpress
NextMove Lite
No-Bot Registration
Novelist
Order Delivery Date for WooCommerce
Ovic Addon Toolkit
Page Builder: Live Composer
Pardot
Podlove Podcast Publisher
PopularFX
Popup by Supsystic
Post Type Builder
Product Input Fields for WooCommerce
ProfileGrid
ReDi Restaurant Reservation
Responsive Contact Form Builder & Lead Generation Plugin
Responsive Contact Form Builder & Lead Generation Plugin
RestroPress
Sangar Slider
Sarada Lite
SEO Booster
Simple Post Notes
Siteimprove
Smash Balloon Social Post Feed
Soledad
Soledad
Spa and Salon
Spotlight Social Media Feeds
Sync Post With Other Site
Table & Contact Form 7 Database – Tablesome
The Conference
The Events Calendar
Ultimate Product Catalogue
UsersWP
Wallet System for WooCommerce
WebinarIgnition
WooCommerce UPS Shipping – Live Rates and Access Points
WordPress Hosting Benchmark tool
WP Accessibility Helper (WAH)
WP Client Reports
WP Compress – Image Optimizer [All-In-One]
WP EasyCart
WP Event Aggregator
WP Mail Catcher
WP Matterport Shortcode
WP2LEADS
WpTravelly
WPZOOM Social Feed Widget & Block
Zoho Campaigns
Zoho Campaigns
As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us through our Bug Bounty Program, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
Source: wordfence.com