Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 20, 2023 to Feb 26, 2023)
Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence Community Edition.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Our mission with Wordfence Intelligence Community Edition is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence Community Edition user interface and vulnerability API are completely free to access and utilize both personally and commercially.
Last week, there were 136 vulnerabilities disclosed in WordPress based software that have been added to the Wordfence Intelligence Community Edition Vulnerability Database, and there were 33 Vulnerability Researchers that contributed to WordPress Security last week. You can find those vulnerabilities below along with some data about the vulnerabilities that were added.
Click here to sign-up for our mailing list and receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
Total Unpatched & Patched Vulnerabilities Last Week
|Patch Status||Number of Vulnerabilities|
Total Vulnerabilities by CVSS Severity Last Week
|Severity Rating||Number of Vulnerabilities|
Total Vulnerabilities by CWE Type Last Week
|Vulnerability Type by CWE||Number of Vulnerabilities|
|Cross-Site Request Forgery (CSRF)||50|
|Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)||40|
|Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)||4|
|Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)||2|
|Improper Input Validation||1|
|Improper Privilege Management||1|
|Deserialization of Untrusted Data||1|
|Improper Control of Generation of Code (‘Code Injection’)||1|
|Unrestricted Upload of File with Dangerous Type||1|
|Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)||1|
|Inefficient Regular Expression Complexity||1|
|Improper Neutralization of Formula Elements in a CSV File||1|
Researchers That Contributed to WordPress Security Last Week
|Researcher Name||Number of Vulnerabilities|
|Nguyen Anh Tien||1|
|Fariq Fadillah Gusti Insani||1|
|Nguyen Xuan Chien||1|
|Prasanna V Balaji||1|
Zendrop – Global Dropshipping