Wordfence Intelligence Weekly WordPress Vulnerability Report (Feb 27, 2023 to Mar 5, 2023)
Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.
This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.
Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially.
Last week, there were 117 vulnerabilities disclosed in WordPress based software that have been added to the Wordfence Intelligence Vulnerability Database, and there were 30 Vulnerability Researchers that contributed to WordPress Security last week. You can find those vulnerabilities below along with some data about the vulnerabilities that were added.
Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.
Total Unpatched & Patched Vulnerabilities Last Week
|Patch Status||Number of Vulnerabilities|
Total Vulnerabilities by CVSS Severity Last Week
|Severity Rating||Number of Vulnerabilities|
Total Vulnerabilities by CWE Type Last Week
|Vulnerability Type by CWE||Number of Vulnerabilities|
|Cross-Site Request Forgery (CSRF)||53|
|Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)||34|
|Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)||2|
|Authorization Bypass Through User-Controlled Key||2|
|Server-Side Request Forgery (SSRF)||2|
|Incorrect Privilege Assignment||1|
|Unrestricted Upload of File with Dangerous Type||1|
|Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)||1|
|Protection Mechanism Failure||1|
|Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)||1|
|Improper Validation of Integrity Check Value||1|
Researchers That Contributed to WordPress Security Last Week
|Researcher Name||Number of Vulnerabilities|
|Prasanna V Balaji||3|
|TEAM WEBoB of BoB 11th||2|
|Nguyen Xuan Chien||2|
|Mohammed El Amin, Chemouri||1|
|Nguyen Thuc Tuyen||1|
Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.