Wordfence Intelligence Weekly WordPress Vulnerability Report (August 28, 2023 to September 3, 2023)

Last week, there were 64 vulnerabilities disclosed in 61 WordPress Plugins and 2 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 32 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API and webhook notifications are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


 

Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Unpatched 37
Patched 27

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Low Severity 2
Medium Severity 53
High Severity 6
Critical Severity 3

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 29
Missing Authorization 12
Cross-Site Request Forgery (CSRF) 11
Unrestricted Upload of File with Dangerous Type 5
Server-Side Request Forgery (SSRF) 1
URL Redirection to Untrusted Site (‘Open Redirect’) 1
Improper Input Validation 1
Authorization Bypass Through User-Controlled Key 1
Improper Control of Generation of Code (‘Code Injection’) 1
Use of Less Trusted Source 1
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) 1

Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
Rio Darmawan 11
Rafie Muhammad 5
Lana Codes
(Wordfence Vulnerability Researcher)
4
thiennv 3
LEE SE HYOUNG 3
Mika 2
Zlrqh 2
Dmitrii 2
László Radnai 2
Elliot 2
Marco Wotschka
(Wordfence Vulnerability Researcher)
2
Bartłomiej Marek 2
Tomasz Swiadek 2
Abdi Pranata 2
Phd 1
Emili Castells 1
Pavitra Tiwari 1
Ramuel Gall
(Wordfence Vulnerability Researcher)
1
FearZzZz 1
emad 1
Prasanna V Balaji 1
deokhunKim 1
yuyudhn 1
Le Ngoc Anh 1
Dipak Panchal 1
mehmet 1
Lokesh Dachepalli 1
Jonas Höbenreich 1
Enrico Marcolini 1
Animesh Gaurav 1
Jonatas Souza Villa Flor 1
Ravi Dharmawan 1

 

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Activity Log aryo-activity-log
AffiliateWP AffiliateWP
All-in-One WP Migration Box Extension all-in-one-wp-migration-box-extension
All-in-One WP Migration Dropbox Extension all-in-one-wp-migration-dropbox-extension
All-in-One WP Migration Google Drive Extension all-in-one-wp-migration-gdrive-extension
All-in-One WP Migration OneDrive Extension all-in-one-wp-migration-onedrive-extension
Better Elementor Addons better-elementor-addons
Bridge Core bridge-core
Ditty – Responsive News Tickers, Sliders, and Lists ditty-news-ticker
DoLogin Security dologin
Easy Coming Soon easy-coming-soon
Easy Newsletter Signups easy-newsletter-signups
Email Encoder – Protect Email Addresses and Phone Numbers email-encoder-bundle
Fast & Effective Popups & Lead-Generation for WordPress – HollerBox holler-box
FileOrganizer – Manage WordPress and Website Files fileorganizer
Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager folders
Font Awesome 4 Menus font-awesome-4-menus
Forminator – Contact Form, Payment Form & Custom Form Builder forminator
GiveWP – Donation Plugin and Fundraising Platform give
GuruWalk Affiliates guruwalk-affiliates
Happy Addons for Elementor Pro happy-elementor-addons-pro
Import XML and RSS Feeds import-xml-feed
Localize Remote Images localize-remote-images
Login and Logout Redirect login-and-logout-redirect
LuckyWP Scripts Control luckywp-scripts-control
Maintenance Switch maintenance-switch
MakeStories (for Google Web Stories) makestories-helper
Metform Elementor Contact Form Builder metform
Multi-column Tag Map multi-column-tag-map
Olive One Click Demo Import olive-one-click-demo-import
Order Tracking – WordPress Status Tracking Plugin order-tracking
Ovic Product Bundle ovic-product-bundle
Popup Builder – Create highly converting, mobile friendly marketing popups. popup-builder
Popup box ays-popup-box
PowerPress Podcasting plugin by Blubrry powerpress
Prevent files / folders access prevent-file-access
Pricing Deals for WooCommerce pricing-deals-for-woocommerce
RSVPMaker rsvpmaker
Remove/hide Author, Date, Category Like Entry-Meta removehide-author-date-category-like-entry-meta
Responsive Gallery Grid responsive-gallery-grid
Sermon’e – Sermons Online sermone-online-sermons-management
Simple 301 Redirects by BetterLinks simple-301-redirects
Site Reviews site-reviews
Sitekit sitekit
Slimstat Analytics wp-slimstat
Smarty for WordPress smarty-for-wordpress
Snap Pixel snap-pixel
Social Media Share Buttons & Social Sharing Icons ultimate-social-media-icons
Social Share Boost social-share-boost
Surfer – WordPress Plugin surferseo
URL Shortener by MyThemeShop mts-url-shortener
Ultimate Addons for Contact Form 7 ultimate-addons-for-contact-form-7
WP Bannerize Pro wp-bannerize-pro
WP GoToWebinar wp-gotowebinar
WP Search Analytics search-analytics
WP Super Minify wp-super-minify
WP Synchro – WordPress Migration Plugin for Database & Files wpsynchro
WP Users Media wp-users-media
WP-dTree wp-dtree-30
WordPress Ecommerce For Creating Fast Online Stores – By SureCart surecart
authLdap authldap

WordPress Themes with Reported Vulnerabilities Last Week

Software Name Software Slug
Arya Multipurpose Pro arya-multipurpose-pro
Everest News Pro everest-news-pro

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.

Forminator <= 1.24.6 – Unauthenticated Arbitrary File Upload

Affected Software: Forminator – Contact Form, Payment Form & Custom Form Builder
CVE ID: CVE-2023-4596
CVSS Score: 9.8 (Critical)
Researcher/s: mehmet
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9cd87da6-1f4c-4a15-8ebb-6e0f8ef72513

Import XML and RSS Feeds <= 2.1.4 – Unauthenticated Remote Code Execution

Affected Software: Import XML and RSS Feeds
CVE ID: CVE-2023-4521
CVSS Score: 9.8 (Critical)
Researcher/s: Enrico Marcolini
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c0856920-5463-4dd3-a4fd-e56901a89b83

RSVPMarker <= 10.6.6 – Unauthenticated SQL Injection

Affected Software: RSVPMaker
CVE ID: CVE-2023-41652
CVSS Score: 9.8 (Critical)
Researcher/s: Ravi Dharmawan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f655704d-70a1-40d8-ae36-39029185d262

Folders <= 2.9.2 – Authenticated (Author+) Arbitrary File Upload in handle_folders_file_upload


Give – Donation Plugin <= 2.33.0 – Authenticated(Give Manager+) Privilege Escalation

Affected Software: GiveWP – Donation Plugin and Fundraising Platform
CVE ID: CVE-2023-41665
CVSS Score: 7.2 (High)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/22ff4b09-063b-425e-9d59-be2e5d283186

Olive One Click Demo Import <= 1.0.9 – Authenticated (Administrator+) Arbitrary File Upload in olive_one_click_demo_import_save_file

Affected Software: Olive One Click Demo Import
CVE ID: CVE-2023-29102
CVSS Score: 7.2 (High)
Researcher/s: deokhunKim
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4f3e3311-11d8-4e4f-9d99-36533fe44d56

DoLogin Security <= 3.6 – Unauthenticated Stored Cross-Site Scripting

Affected Software: DoLogin Security
CVE ID: CVE-2023-4549
CVSS Score: 7.2 (High)
Researcher/s: Bartłomiej Marek, Tomasz Swiadek
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ad34d657-da59-46ff-a54a-64e6c8974b69

Prevent files / folders access <= 2.5.1 – Authenticated (Administrator+) Arbitrary File Upload in mo_media_restrict_page

Affected Software: Prevent files / folders access
CVE ID: CVE-2023-4238
CVSS Score: 7.2 (High)
Researcher/s: Dmitrii
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b266bd10-dbc6-4058-a5b2-1578c0814cb4

Import XML and RSS Feeds <= 2.1.3 – Authenticated (Admin+) Arbitrary File Upload

Affected Software: Import XML and RSS Feeds
CVE ID: CVE-2023-4300
CVSS Score: 7.2 (High)
Researcher/s: Jonatas Souza Villa Flor
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f45b4c43-c6c4-41da-bd59-9a355800815a

Easy Newsletter Signups <= 1.0.4 – Missing Authorization

Affected Software: Easy Newsletter Signups
CVE ID: CVE-2023-41664
CVSS Score: 6.5 (Medium)
Researcher/s: Emili Castells
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/288946ae-6e58-42e6-89d1-8951539728d3

Slimstat Analytics <= 5.0.9 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Slimstat Analytics
CVE ID: CVE-2023-4597
CVSS Score: 6.4 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/52aee4b8-f494-4eeb-8357-71ce8d5bc656

Sitekit <= 1.3 – Authenticated (Contributor+) Stored Cross-Site Scripting via ‘sitekit_iframe ‘ shortcode

Affected Software: Sitekit
CVE ID: CVE-2023-27628
CVSS Score: 6.4 (Medium)
Researcher/s: Mika
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/7f0be29a-7896-4166-a2a6-64f99d845236

Font Awesome 4 Menus <= 4.7.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Font Awesome 4 Menus
CVE ID: CVE-2023-4718
CVSS Score: 6.4 (Medium)
Researcher/s: Lana Codes
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/dc59510c-6eaf-4526-8acb-c07e39923ad9

Email Encoder <= 2.1.7 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Affected Software: Email Encoder – Protect Email Addresses and Phone Numbers
CVE ID: CVE-2023-4599
CVSS Score: 6.4 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e90f04e4-eb4c-4822-89c6-79f553987c37

Login and Logout Redirect <= 2.0.2 – Open Redirect

Affected Software: Login and Logout Redirect
CVE ID: CVE-2023-41648
CVSS Score: 6.1 (Medium)
Researcher/s: Phd
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/09a0639e-4b14-4dc9-a50c-d18234faa7b1

Arya Multipurpose Pro <= 1.0.8 – Reflected Cross-Site Scripting

Affected Software: Arya Multipurpose Pro
CVE ID: CVE-2023-41237
CVSS Score: 6.1 (Medium)
Researcher/s: László Radnai
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/22cfbaa1-5412-4944-899c-7ae41d017384

Social Media & Share Icons <= 2.8.3 – Reflected Cross-Site Scripting

Affected Software: Social Media Share Buttons & Social Sharing Icons
CVE ID: CVE-2023-41238
CVSS Score: 6.1 (Medium)
Researcher/s: FearZzZz
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3a8998db-ffc2-40b2-a191-09380984adac

URL Shortener by MyThemeShop <= 1.0.17 – Reflected Cross-Site Scripting via ‘page’

Affected Software: URL Shortener by MyThemeShop
CVE ID: CVE-2023-30472
CVSS Score: 6.1 (Medium)
Researcher/s: LEE SE HYOUNG
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/52c2837e-8947-4ce9-bda5-e0c2f831fb36

Sermon’e – Sermons Online <= 1.0.0 – Reflected Cross-Site Scripting

Affected Software: Sermon’e – Sermons Online
CVE ID: CVE-2023-41653
CVSS Score: 6.1 (Medium)
Researcher/s: yuyudhn
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5c17678e-6598-4e80-b121-beae822b9f81

WP-dTree <= 4.4.5 – Reflected Cross-Site Scripting

Affected Software: WP-dTree
CVE ID: CVE-2023-41662
CVSS Score: 6.1 (Medium)
Researcher/s: Le Ngoc Anh
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6c01da54-fbbe-42f9-a76e-8e823027d62a

Everest News Pro <= 1.1.7 – Reflected Cross-Site Scripting

Affected Software: Everest News Pro
CVE ID: CVE-2023-41235
CVSS Score: 6.1 (Medium)
Researcher/s: László Radnai
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/bb967453-59d6-4b03-8c75-1906b99bff80

Bridge Core <= 3.0.9 – Reflected Cross-Site Scripting

Affected Software: Bridge Core
CVE ID: CVE-2023-40333
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/bc698c40-4a2b-4dab-93f0-647e4db79d2c

Ditty <= 3.1.24 – Reflected Cross-Site Scripting

Affected Software: Ditty – Responsive News Tickers, Sliders, and Lists
CVE ID: CVE-2023-4148
CVSS Score: 6.1 (Medium)
Researcher/s: Animesh Gaurav
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cabf7aae-0673-4358-a2df-0ca22c8432b5

Happy Elementor Addons Pro <= 2.8.0 – Reflected Cross-Site Scripting

Affected Software: Happy Addons for Elementor Pro
CVE ID: CVE-2023-41236
CVSS Score: 6.1 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d536d3a8-9ac5-4ea9-8c65-16ad8b3a7106

Ultimate Addons for Contact Form 7 <= 3.1.32 – Reflected Cross-Site Scripting via ‘page’

Affected Software: Ultimate Addons for Contact Form 7
CVE ID: CVE-2023-30493
CVSS Score: 6.1 (Medium)
Researcher/s: LEE SE HYOUNG
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d857324c-94c9-471a-9da8-0b8c9bb50262

Order Tracking Pro <= 3.3.6 – Reflected Cross-Site Scripting

Affected Software: Order Tracking – WordPress Status Tracking Plugin
CVE ID: CVE-2023-4471
CVSS Score: 6.1 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ed64d0ff-4f49-4c18-86ec-2c6fbd559d2e

WP Bannerize Pro <= 1.6.9 – Reflected Cross-Site Scripting

Affected Software: WP Bannerize Pro
CVE ID: CVE-2023-41663
CVSS Score: 6.1 (Medium)
Researcher/s: thiennv
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/edc35f8c-f916-433e-9d3f-4992e8c9d7cd

WP Search Analytics <= 1.4.7 – Reflected Cross-Site Scripting via ‘render_stats_page’

Affected Software: WP Search Analytics
CVE ID: CVE-2023-30471
CVSS Score: 6.1 (Medium)
Researcher/s: LEE SE HYOUNG
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f6433a17-0017-46a9-a8e6-4d4a4a55f2db

PowerPress <= 11.0.6 – Authenticated (Contributor+) Server-Side Request Forgery via wp_ajax_powerpress_media_info

Affected Software: PowerPress Podcasting plugin by Blubrry
CVE ID: CVE-2023-41239
CVSS Score: 5.4 (Medium)
Researcher/s: Mika
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/031c31b2-6e27-47bb-9f63-2bbaa1edbbb2

Site Reviews <= 6.10.2 – Missing Authorization

Affected Software: Site Reviews
CVE ID: CVE Unknown
CVSS Score: 5.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1accc41e-41d2-49e3-a80a-6b95b02cb42e

Responsive Gallery Grid <= 2.3.10 – Cross-Site Request Forgery

Affected Software: Responsive Gallery Grid
CVE ID: CVE-2023-41659
CVSS Score: 5.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3abe2de8-9127-4ef0-9194-cf331b20868a

LuckyWP Scripts Control <= 1.2.1 – Missing Authorization via multiple AJAX actions

Affected Software: LuckyWP Scripts Control
CVE ID: CVE-2023-29239
CVSS Score: 5.4 (Medium)
Researcher/s: Elliot
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3ed93c5c-38bb-4e84-8fe8-03dd75b4d9f3

Maintenance Switch <= 1.5.2 – Cross-Site Request Forgery via ‘admin_action_request’

Affected Software: Maintenance Switch
CVE ID: CVE-2023-29235
CVSS Score: 5.4 (Medium)
Researcher/s: Elliot
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6f14f19d-95b3-474b-a2ea-d846c85644cd

Simple 301 Redirects <= 2.0.7 – Cross-Site Request Forgery via ‘clicked’

Affected Software: Simple 301 Redirects by BetterLinks
CVE ID: CVE Unknown
CVSS Score: 5.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9945c85b-a97a-4ad0-9d0a-69faf157563a

Surfer <= 1.1.2.298 – Missing Authorization

Affected Software: Surfer – WordPress Plugin
CVE ID: CVE-2023-35037
CVSS Score: 5.4 (Medium)
Researcher/s: Jonas Höbenreich
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c06f9f6d-3cd0-4700-834b-435a99983453

Pricing Deals for WooCommerce <= 2.0.3.2 – Missing Authorization via vtprd_ajax_clone_rule

Affected Software: Pricing Deals for WooCommerce
CVE ID: CVE-2023-41240
CVSS Score: 5.3 (Medium)
Researcher/s: thiennv
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1101bfe6-2075-4f44-933b-6d9f372100a2

Ovic Product Bundle <= 1.1.2 – Missing Authorization

Affected Software: Ovic Product Bundle
CVE ID: CVE-2023-41649
CVSS Score: 5.3 (Medium)
Researcher/s: thiennv
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5657ffe2-7d04-4834-bcec-ab6afaeda7df

Multiple ServMask Plugins <= (Various Versions) – Missing Authorization to Access Token Update


Localize Remote Images <= 1.0.9 – Cross-Site Request Forgery via admin menu

Affected Software: Localize Remote Images
CVE ID: CVE-2023-41244
CVSS Score: 5.3 (Medium)
Researcher/s: Lokesh Dachepalli
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ab96123e-17aa-461f-b460-e8eba82c78e1

Multi-column Tag Map <= 17.0.26 – Missing Authorization

Affected Software: Multi-column Tag Map
CVE ID: CVE-2023-41651
CVSS Score: 5.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d2a60cb2-fe7d-4c51-9995-5cb4682d9d26

Activity Log <= 2.8.7 – IP Address Spoofing

Affected Software: Activity Log
CVE ID: CVE-2023-4281
CVSS Score: 5.3 (Medium)
Researcher/s: Bartłomiej Marek, Tomasz Swiadek
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/de821236-f878-46a4-9265-bcf6e8661910

Order Tracking Pro <= 3.3.6 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Order Tracking – WordPress Status Tracking Plugin
CVE ID: CVE-2023-4500
CVSS Score: 4.7 (Medium)
Researcher/s: Marco Wotschka
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3

GuruWalk Affiliates <= 1.0.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings

Affected Software: GuruWalk Affiliates
CVE ID: CVE-2023-27622
CVSS Score: 4.4 (Medium)
Researcher/s: Pavitra Tiwari
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2b2714f7-9877-4d3d-a692-70fbf8584728

SureCart <= 2.5.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings

Affected Software: WordPress Ecommerce For Creating Fast Online Stores – By SureCart
CVE ID: CVE-2023-41241
CVSS Score: 4.4 (Medium)
Researcher/s: emad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/416c13ff-15ae-4ba4-8a95-7c07bec75c22

Smarty for WordPress <= 3.1.35 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Smarty for WordPress
CVE ID: CVE-2023-41661
CVSS Score: 4.4 (Medium)
Researcher/s: Prasanna V Balaji
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/498a10a1-8da6-4309-833f-950f6442d5ae

WP GoToWebinar <= 14.45 – Authenticated (Administrator+) Cross-Site Scripting

Affected Software: WP GoToWebinar
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4a7b32f5-5d27-4f5a-89f3-abf4f8da79e4

HollerBox <= 2.3.2 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Fast & Effective Popups & Lead-Generation for WordPress – HollerBox
CVE ID: CVE-2023-41657
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5c76871e-b774-4284-ad00-f8ef7f6df389

Popup Builder <= 4.1.15 – Authenticated (Admin+) Stored Cross-Site Scripting

Affected Software: Popup Builder – Create highly converting, mobile friendly marketing popups.
CVE ID: CVE-2023-3226
CVSS Score: 4.4 (Medium)
Researcher/s: Dipak Panchal
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/7f97af51-1532-4034-8b2a-8356b65cb617

Snap Pixel <= 1.5.7 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Snap Pixel
CVE ID: CVE-2023-41242
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c37686f8-6bd7-4c06-b80a-7d6849bbc7b0

Easy Coming Soon <= 2.3 – Authenticated (Administrator+) Stored Cross-Site Scripting via plugin settings

Affected Software: Easy Coming Soon
CVE ID: CVE-2023-25483
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e46139c8-dd7e-4904-81b2-283952cea9b5

Popup Box <= 3.7.1 – Authenticated(Administrator+) Stored Cross-Site Scripting

Affected Software: Popup box
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/e6dbbb52-4202-4d69-837f-c7d5ca06fab5

WP Users Media <= 4.2.3 – Cross-Site Request Forgery in wpusme_save_settings

Affected Software: WP Users Media
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Zlrqh
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/07a82335-d738-4c14-b385-04843f12e4ef

Metform Elementor Contact Form Builder <= 3.3.1 – Authenticated (Subscriber+) Information Disclosure via ‘mf_first_name’ shortcode

Affected Software: Metform Elementor Contact Form Builder
CVE ID: CVE-2023-0689
CVSS Score: 4.3 (Medium)
Researcher/s: Ramuel Gall
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/356cf06e-16e7-438b-83b5-c8a52a21f903

Social Share Boost <= 4.5 – Cross-Site Request Forgery via ‘syntatical_settings_content’

Affected Software: Social Share Boost
CVE ID: CVE-2023-25033
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/53a265b8-e34c-4683-a653-4b4b2410e9de

Better Elementor Addons <= 1.3.5 – Missing Authorization

Affected Software: Better Elementor Addons
CVE ID: CVE-2023-41656
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5a628eef-937c-4391-afac-22128ec5b51c

WP Users Media <= 4.2.3 – Missing Authorization via wpusme_save_settings

Affected Software: WP Users Media
CVE ID: CVE-2023-27428
CVSS Score: 4.3 (Medium)
Researcher/s: Zlrqh
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/8e125188-4aff-4c64-b4ec-a363db2431b7

WP Super Minify <= 1.5.1 – Cross-Site Request Forgery via ‘wpsmy_admin_options’

Affected Software: WP Super Minify
CVE ID: CVE-2023-27615
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/af59fcf6-4435-45f0-8904-ff520ea86157

Remove/hide Author, Date, Category Like Entry-Meta <= 2.1 – Cross-Site Request Forgery

Affected Software: Remove/hide Author, Date, Category Like Entry-Meta
CVE ID: CVE-2023-41650
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cd0abdf2-24da-4e87-825b-0796af6c3ccd

MakeStories (for Google Web Stories) <= 2.8.0 – Cross-Site Request Forgery via ‘ms_set_options’

Affected Software: MakeStories (for Google Web Stories)
CVE ID: CVE-2023-27448
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d9f7130d-883a-4db4-9edf-f5526724de11

AffiliateWP <= 2.14.0 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Activation

Affected Software: AffiliateWP
CVE ID: CVE-2023-4600
CVSS Score: 4.3 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/eab422b8-8cf5-441e-a21f-6a0e1b7642b2

authLdap <= 2.5.8 – Cross-Site Request Forgery

Affected Software: authLdap
CVE ID: CVE-2023-41654
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/eddce6e0-2ea7-4980-97a7-857b2e1e3b69

WP Migration Plugin DB & Files – WP Synchro <= 1.9.1 – Cross-Site Request Forgery

Affected Software: WP Synchro – WordPress Migration Plugin for Database & Files
CVE ID: CVE-2023-41660
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f1b6f041-5ea6-48ca-9ca7-4ce96cbfa275

authLdap <= 2.5.8 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: authLdap
CVE ID: CVE-2023-41655
CVSS Score: 3.3 (Low)
Researcher/s: Rio Darmawan
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5b91ad8b-79ec-4ef7-bb39-edb06309da5e

FileOrganizer <= 1.0.2 – Authenticated (Admin+) Arbitrary File Access

Affected Software: FileOrganizer – Manage WordPress and Website Files
CVE ID: CVE-2023-3664
CVSS Score: 2.7 (Low)
Researcher/s: Dmitrii
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/11c9124d-80e0-435d-9eb4-901c4f481a6f

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (August 28, 2023 to September 3, 2023) appeared first on Wordfence.

Stored Cross-Site Scripting Vulnerability Patched in Newsletter WordPress Plugin

On August 16, 2023, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for a stored Cross-Site Scripting (XSS) vulnerability in the Newsletter plugin, which is actively installed on more than 300,000 WordPress websites. The vulnerability enables threat actors with contributor-level permissions or higher to inject malicious web scripts into pages using the plugin’s shortcode.

All Wordfence PremiumWordfence Care, and Wordfence Response customers, as well as those still using the free version of our plugin, are protected against any exploits targeting this vulnerability by the Wordfence firewall’s built-in Cross-Site Scripting protection.

We contacted The Newsletter Team on August 16, 2023, and we received a response on the next day. After providing full disclosure details, the developer released a patch on August 17, 2023. We would like to commend The Newsletter Team for their prompt response and timely patch, which was released on the same day.

We urge users to update their sites with the latest patched version of Newsletter, version 7.9.0 at the time of this writing, as soon as possible.

Vulnerability Summary from Wordfence Intelligence

Description: Newsletter <= 7.8.9 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Affected Plugin: Newsletter – Send awesome emails from WordPress
Plugin Slug: newsletter
Affected Versions: <= 7.8.9
CVE ID: CVE-2023-4772
CVSS Score: 6.4 (Medium)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Researcher/s: Lana Codes
Fully Patched Version: 7.9.0

The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘newsletter_form’ shortcode in versions up to, and including, 7.8.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Technical Analysis

The Newsletter plugin is a newsletter and email marketing system, with a drag and drop newsletter builder and many other features. It provides a shortcode ([newsletter_form]) that displays the newsletter subscription form when added to a WordPress page.

Unfortunately, insecure implementation of the plugin’s shortcode functionality allows for the injection of arbitrary web scripts into these pages. Examining the code reveals that the shortcode has two types, one of which is the get_subscription_form_minimal method handling the minimal type in the NewsletterSubscription class. In vulnerable versions, this method does not adequately sanitize the user-supplied ‘class’ input, and also does not adequately escape the ‘class’ output when it displays the form. This makes it possible to inject attribute-based Cross-Site Scripting payloads via the ‘class’ attribute.

function shortcode_newsletter_form($attrs, $content) {

        if (isset($attrs['type']) && $attrs['type'] === 'minimal') {
            return $this->get_subscription_form_minimal($attrs);
        }

The shortcode_newsletter_form method snippet in the NewsletterSubscription class

function get_subscription_form_minimal($attrs) {
        if (!is_array($attrs)) {
            $attrs = [];
        }

        $attrs = array_merge(array('class' => '', 'referrer' => 'minimal',
            'button' => $this->get_text('subscribe', 'form'), 'button_color' => '',
            'button_radius' => '', 'placeholder' => $this->get_text('email', 'form')), $attrs);

        $form = '';

        $form .= '<div class="tnp tnp-subscription-minimal ' . $attrs['class'] . '">';
        $form .= '<form action="' . esc_attr($this->build_action_url('s')) . '" method="post"';
        if (!empty($attrs['id'])) {
            $form .= ' id="' . esc_attr($attrs['id']) . '"';
        }
        $form .= '>';

        $form .= $this->get_form_hidden_fields($attrs);

        $form .= '<input class="tnp-email" type="email" required name="ne" value="" placeholder="' . esc_attr($attrs['placeholder']) . '">';

        if (isset($attrs['button_label'])) {
            $label = $attrs['button_label'];
        } else if (isset($attrs['button'])) { // Backward compatibility
            $label = $attrs['button'];
        } else {
            $label = $this->get_text('subscribe', 'form');
        }

        $form .= '<input class="tnp-submit" type="submit" value="' . esc_attr($attrs['button']) . '"'
                . ' style="background-color:' . esc_attr($attrs['button_color']) . '">';

        $form .= $this->get_privacy_field('<div class="tnp-field tnp-privacy-field">', '</div>');

        $form .= "</form></div>n";

        return $form;
    }

The get_subscription_form_minimal method in the NewsletterSubscription class

This makes it possible for threat actors to carry out stored XSS attacks. Once a script is injected into a page or post, it will execute each time a user accesses the affected page. While this vulnerability does require that a trusted contributor account is compromised, or that a user be able to register as a contributor, successful threat actors could steal sensitive information, manipulate site content, inject administrative users, edit files, or redirect users to malicious websites which are all severe consequences.

Shortcode Exploit Possibilities

Some previous versions of WordPress contained a vulnerability that allowed shortcodes supplied by unauthenticated commenters to be rendered in certain rare configurations, though the vast majority of sites have been automatically upgraded to a patched release of WordPress as of this writing.

Disclosure Timeline

August 16, 2023 – Wordfence Threat Intelligence team discovers the stored XSS vulnerability in Newsletter.
August 16, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.
August 17, 2023 – The vendor confirms the inbox for handling the discussion.
August 17, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.
August 17, 2023 – The fully patched version, 7.9.0, is released.

Conclusion

In this blog post, we have detailed a stored XSS vulnerability within the Newsletter plugin affecting versions 7.8.9 and earlier. This vulnerability allows authenticated threat actors with contributor-level permissions or higher to inject malicious web scripts into pages that execute when a user accesses an affected page. The vulnerability has been fully addressed in version 7.9.0 of the plugin.

We encourage WordPress users to verify that their sites are updated to the latest patched version of Newsletter.

All Wordfence users, including those running Wordfence PremiumWordfence Care, and Wordfence Response, as well as sites still running the free version of Wordfence, are fully protected against this vulnerability.

If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.

For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence and potentially earn a spot on our leaderboard.

The post Stored Cross-Site Scripting Vulnerability Patched in Newsletter WordPress Plugin appeared first on Wordfence.

Wordfence Intelligence Weekly WordPress Vulnerability Report (August 21, 2023 to August 27, 2023)

Last week, there were 43 vulnerabilities disclosed in 38 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 23 Vulnerability Researchers that contributed to WordPress Security last week. Review those vulnerabilities in this report now to ensure your site is not affected.

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface, vulnerability API and webhook notifications are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.


New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.


Total Unpatched & Patched Vulnerabilities Last Week

Patch Status Number of Vulnerabilities
Unpatched 17
Patched 26

Total Vulnerabilities by CVSS Severity Last Week

Severity Rating Number of Vulnerabilities
Low Severity 0
Medium Severity 35
High Severity 6
Critical Severity 2

Total Vulnerabilities by CWE Type Last Week

Vulnerability Type by CWE Number of Vulnerabilities
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 16
Missing Authorization 13
Cross-Site Request Forgery (CSRF) 8
Unrestricted Upload of File with Dangerous Type 2
Reliance on Untrusted Inputs in a Security Decision 1
Authentication Bypass Using an Alternate Path or Channel 1
Use of Less Trusted Source 1
Improper Privilege Management 1

Researchers That Contributed to WordPress Security Last Week

Researcher Name Number of Vulnerabilities
Rafshanzani Suhada 6
Abdi Pranata 3
Rio Darmawan 3
Rafie Muhammad 3
Mahesh Nagabhairava 2
Nguyen Xuan Chien 2
yuyuddn 1
Bob Matyas 1
Carlos David Garrido León 1
Skalucy 1
Nithissh S 1
Animesh Gaurav 1
Muhammad Daffa 1
konagash 1
Dipak Panchal 1
Bartłomiej Marek 1
Tomasz Swiadek 1
An Dang 1
Erwan LR 1
Mika 1
Lana Codes
(Wordfence Vulnerability Researcher)
1
Dmitrii Ignatyev 1
Revan Arifio 1

 

Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence leaderboard along with being mentioned in our weekly vulnerability report.


WordPress Plugins with Reported Vulnerabilities Last Week

Software Name Software Slug
Category Slider for WooCommerce woo-category-slider-grid
Collapse-O-Matic jquery-collapse-o-matic
Cookies by JM cookies-by-jm
DX-auto-save-images dx-auto-save-images
DoLogin Security dologin
ElementsKit Elementor addons elementskit-lite
FTP Access ftp-access
FV Flowplayer Video Player fv-wordpress-flowplayer
Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager folders
Herd Effects – fake notifications and social proof plugin mwp-herd-effect
Hide My WP Ghost – Security Plugin hide-my-wp
Jupiter X Core jupiterx-core
Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages page-builder-add
Leyka leyka
Lock User Account lock-user-account
Master Addons for Elementor master-addons
MasterStudy LMS WordPress Plugin – for Online Courses and Education masterstudy-lms-learning-management-system
Min Max Control – Min Max Quantity & Step Control for WooCommerce woo-min-max-quantity-step-control-single
Post and Page Builder by BoldGrid – Visual Drag and Drop Editor post-and-page-builder
Posts Like Dislike posts-like-dislike
Premmerce User Roles premmerce-user-roles
Push Notification for Post and BuddyPress push-notification-for-post-and-buddypress
ReviewX – Multi-criteria Rating & Reviews for WooCommerce reviewx
Royal Elementor Addons and Templates royal-elementor-addons
Save as Image plugin by Pdfcrowd save-as-image-by-pdfcrowd
Save as PDF plugin by Pdfcrowd save-as-pdf-by-pdfcrowd
Secure Admin IP secure-admin-ip
Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management simple-urls
Slimstat Analytics wp-slimstat
Sticky Social Media Icons sticky-social-media-icons
Translate WordPress with GTranslate gtranslate
URL Shortify – Simple, Powerful and Easy URL Shortener Plugin For WordPress url-shortify
Vertical marquee plugin vertical-marquee-plugin
Void Elementor Post Grid Addon for Elementor Page builder void-elementor-post-grid-addon-for-elementor-page-builder
WP Adminify – WordPress Dashboard Customization | Custom Login | Admin Columns | Dashboard Widget | Media Library Folders adminify
WP VK-付费内容插件(付费阅读/资料/工具软件资源管理) wp-vk
gAppointments – Appointment booking addon for Gravity Forms gAppointments
iThemes Sync ithemes-sync

Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.

JupiterX Core <= 3.3.5 – Unauthenticated Arbitrary File Upload

Affected Software: Jupiter X Core
CVE ID: CVE-2023-38388
CVSS Score: 9.8 (Critical)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/980a9237-7dea-4058-a850-b849457b4fef

JupiterX Core <= 3.3.8 – Unauthenticated Privilege Escalation

Affected Software: Jupiter X Core
CVE ID: CVE-2023-38389
CVSS Score: 9.8 (Critical)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/b894473b-b2ed-475b-892e-603db609f88a

Folders <= 2.9.2 – Authenticated (Author+) Arbitrary File Upload

Affected Software: Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager
CVE ID: CVE Unknown
CVSS Score: 8.8 (High)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/35afef52-350c-4b61-b9c0-3ae2572f81fb

Premmerce User Roles <= 1.0.12 – Missing Authorization via role management functions

Affected Software: Premmerce User Roles
CVE ID: CVE-2023-41130
CVSS Score: 8.3 (High)
Researcher/s: Nguyen Xuan Chien
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f53cd4a3-a6db-42c2-b4d8-218071c4bcd4

Master Addons for Elementor <= 2.0.3 – Missing Authorization

Affected Software: Master Addons for Elementor
CVE ID: CVE-2023-40679
CVSS Score: 7.3 (High)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/6150c355-1046-483e-aa8b-463c3752021d

MasterStudy LMS <= 3.0.17 – Privilege Escalation

Affected Software: MasterStudy LMS WordPress Plugin – for Online Courses and Education
CVE ID: CVE-2023-4278
CVSS Score: 7.3 (High)
Researcher/s: Revan Arifio
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/df00c8bc-8acd-4197-86fe-b88cb47d52c3

Simple URLs <= 117 – Unauthenticated Cross-Site Scripting

Affected Software: Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management
CVE ID: CVE-2023-40667
CVSS Score: 7.2 (High)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/54c38be0-ffe7-4fa4-b5c9-cb717c11aed5

URL Shortify <= 1.7.5 – Unauthenticated Stored Cross-Site Scripting via Referrer Header


Collapse-O-Matic <= 1.8.4 – Authenticated (Contributor+) Stored Cross-Site Scripting

Affected Software: Collapse-O-Matic
CVE ID: CVE-2023-40669
CVSS Score: 6.4 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/aa85abba-e13f-42cd-8f13-432ed375fb37

Simple URLs <= 117 – Authenticated (Contributor+) Stored Cross-Site Scripting

Affected Software: Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management
CVE ID: CVE-2023-40674
CVSS Score: 6.4 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/f8147f63-91a5-457c-8259-8e4ddf5c67e4

FTP Access <= 1.0 – Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting

Affected Software: FTP Access
CVE ID: CVE-2023-3510
CVSS Score: 6.1 (Medium)
Researcher/s: Bob Matyas
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0a1e0d55-2894-450b-afaf-134a13512403

gAppointments – Appointment booking addon for Gravity Forms <= 1.9.7 – Reflected Cross-Site Scripting

Affected Software: gAppointments – Appointment booking addon for Gravity Forms
CVE ID: CVE-2023-2705
CVSS Score: 6.1 (Medium)
Researcher/s: Carlos David Garrido León
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/19983f79-b439-4bb0-8f29-8312f1ff9791

Min Max Control <= 4.5 – Reflected Cross-Site Scripting

Affected Software: Min Max Control – Min Max Quantity & Step Control for WooCommerce
CVE ID: CVE-2023-4270
CVSS Score: 6.1 (Medium)
Researcher/s: Animesh Gaurav
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4240fcda-c61d-4888-8837-5012e5ba1f26

Elements kit Elementor addons <= 2.9.1 – Missing Authorization

Affected Software: ElementsKit Elementor addons
CVE ID: CVE-2023-39993
CVSS Score: 5.4 (Medium)
Researcher/s: Rafie Muhammad
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5ff589ec-756d-4183-8bb8-61dae9be7c5d

FV Flowplayer Video Player <= 7.5.37.7212 – Insufficient Input Validation to Unauthenticated Stored Cross-Site Scripting and Arbitrary Usermeta Update

Affected Software: FV Flowplayer Video Player
CVE ID: CVE-2023-4520
CVSS Score: 5.4 (Medium)
Researcher/s: Lana Codes
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/c55ca7d4-6bc0-49c9-8ce0-50fff8775a76

Void Elementor Post Grid Addon for Elementor Page builder <= 2.1.10 – Missing Authorization to Review Notice Dismissal

Affected Software: Void Elementor Post Grid Addon for Elementor Page builder
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/1b847857-5dc9-4793-b9d6-759f27377fe3

Push Notification for Post and BuddyPress <= 1.63 – Missing Authorization to Unauthenticated Admin Notice Dismissal

Affected Software: Push Notification for Post and BuddyPress
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/228a3c72-fbb0-48bc-8066-6ca954a14421

Hide My WP Ghost <= 5.0.25 – CAPTCHA Bypass in brute_math_authenticate

Affected Software: Hide My WP Ghost – Security Plugin
CVE ID: CVE-2023-34001
CVSS Score: 5.3 (Medium)
Researcher/s: konagash
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5618db77-fe74-4982-92b3-cec554640bde

Posts Like Dislike <= 1.1.1 – Missing Authorization to Authenticated (Subscriber+) Plugin Setting Reset

Affected Software: Posts Like Dislike
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/8babc42a-c45c-423f-bd09-da7afb947691

Secure Admin IP <= 2.0 – Missing Authorization via ‘saveSettings’

Affected Software: Secure Admin IP
CVE ID: CVE-2023-41133
CVSS Score: 5.3 (Medium)
Researcher/s: Mika
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/a0f38af7-7753-4dbe-a4fd-e9a01785dd13

DoLogin Security <= 3.6 – IP Address Spoofing

Affected Software: DoLogin Security
CVE ID: CVE Unknown
CVSS Score: 5.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/def06edd-ea4f-4b49-9902-b179d40e4133

Vertical Marquee Plugin <= 7.1 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Vertical marquee plugin
CVE ID: CVE-2023-40677
CVSS Score: 4.4 (Medium)
Researcher/s: yuyuddn
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/06c86c87-840c-4ca6-9582-98254194eb1b

Cookies by JM <= 1.0 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Cookies by JM
CVE ID: CVE-2023-40604
CVSS Score: 4.4 (Medium)
Researcher/s: Nithissh S
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3aa2a693-831b-44e7-b158-99fecf6506be

Slimstat Analytics <= 5.0.8 – Authenticated (Administrator+) Stored Cross-Site Scripting via settings

Affected Software: Slimstat Analytics
CVE ID: CVE-2023-40676
CVSS Score: 4.4 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/3c14a863-2aed-4f65-a0e3-eb73e485ce85

Save as PDF plugin by Pdfcrowd <= 2.16.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings

Affected Software: Save as PDF plugin by Pdfcrowd
CVE ID: CVE-2023-40668
CVSS Score: 4.4 (Medium)
Researcher/s: Mahesh Nagabhairava
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/52056177-8604-48b9-ab50-d0dc1e13a3d5

GTranslate <= 3.0.3 – Authenticated (Administrator+) Cross-Site Scripting via Multiple Parameters

Affected Software: Translate WordPress with GTranslate
CVE ID: CVE Unknown
CVSS Score: 4.4 (Medium)
Researcher/s: Unknown
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/5e24be91-6a58-42c3-84dd-4090da55b720

WP Adminify <= 3.1.5 – Authenticated (Admin+) Stored Cross-Site Scripting


Save as Image plugin by Pdfcrowd <= 2.16.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via settings

Affected Software: Save as Image plugin by Pdfcrowd
CVE ID: CVE-2023-40665
CVSS Score: 4.4 (Medium)
Researcher/s: Mahesh Nagabhairava
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/74b284b7-ec0a-42c1-82e5-0c8cb422c0c5

Leyka <= 3.30.3 – Authenticated (Administrator+) Stored Cross-Site Scripting

Affected Software: Leyka
CVE ID: CVE-2023-2995
CVSS Score: 4.4 (Medium)
Researcher/s: An Dang
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/95210ed8-4606-44fa-b823-b33e1d4a4ce0

Landing Page Builder <= 1.5.1.1 – Authenticated (Administrator+) Stored Cross-Site Scripting


WP VK-付费内容插件 <= 1.3.3 – Cross-Site Request Forgery via AJions

Affected Software: WP VK-付费内容插件(付费阅读/资料/工具软件资源管理)
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0c6bc786-341a-4ab6-b86e-d21bb3dbf298

iThemes Sync <= 2.1.13 – Cross-Site Request Forgery and Missing Authorization via ‘hide_authenticate_notice’

Affected Software: iThemes Sync
CVE ID: CVE-2023-40001
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/0f9229f2-e7dd-43c9-9c15-9b76c13e895b

Simple URLs <= 117 – Missing Authorization via AJAX actions

Affected Software: Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management
CVE ID: CVE-2023-40678
CVSS Score: 4.3 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/118e1a8c-a638-4571-9ce9-cf2cba4b9b06

DX-auto-save-images <= 1.4.0 – Cross-Site Request Forgery

Affected Software: DX-auto-save-images
CVE ID: CVE-2023-40671
CVSS Score: 4.3 (Medium)
Researcher/s: Skalucy
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/2f2fb51b-984c-4b82-98d4-9a681a1855a7

Royal Elementor Addons <= 1.3.75 – Cross-Site Request Forgery

Affected Software: Royal Elementor Addons and Templates
CVE ID: CVE-2022-47175
CVSS Score: 4.3 (Medium)
Researcher/s: Muhammad Daffa
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/4809d513-69e8-4572-9549-9dba9f40cb80

Sticky Social Media Icons <= 2.0 – Missing Authorization via ajax_request_handle

Affected Software: Sticky Social Media Icons
CVE ID: CVE-2023-40672
CVSS Score: 4.3 (Medium)
Researcher/s: Nguyen Xuan Chien
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/58cfb328-40d0-4bea-a707-d5d6c1ce364a

ReviewX <= 1.6.17 – Missing Authorization in rx_coupon_from_submit

Affected Software: ReviewX – Multi-criteria Rating & Reviews for WooCommerce
CVE ID: CVE-2023-40670
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9a9f4fb7-92f5-4136-9ca3-cf7bf5c0b717

Herd Effects <= 5.2.3 – Cross-Site Request Forgery to Effect Deletion

Affected Software: Herd Effects – fake notifications and social proof plugin
CVE ID: CVE-2023-4318
CVSS Score: 4.3 (Medium)
Researcher/s: Erwan LR
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/9fd15c0b-cd3b-45e7-8379-b0e64e64d6b1

Category Slider for WooCommerce <= 1.4.15 – Missing Authorization via notice dismissal functionality

Affected Software: Category Slider for WooCommerce
CVE ID: CVE-2023-41132
CVSS Score: 4.3 (Medium)
Researcher/s: Abdi Pranata
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/ab1bd64b-8575-4ab4-bca5-8d5ce6f476d1

Simple URLs <= 117 – Cross-Site Request Forgery via AJAX actions

Affected Software: Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management
CVE ID: CVE Unknown
CVSS Score: 4.3 (Medium)
Researcher/s: Unknown
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/bf101b60-f12e-4326-8e39-96d6415a218d

Post and Page Builder by BoldGrid – Visual Drag and Drop Editor <= 1.24.1 – Cross-Site Request Forgery via submitDefaultEditor

Affected Software: Post and Page Builder by BoldGrid – Visual Drag and Drop Editor
CVE ID: CVE-2023-25480
CVSS Score: 4.3 (Medium)
Researcher/s: Rio Darmawan
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/bf801042-5cd5-424f-a25a-858302285170

Slimstat Analytics <= 5.0.5.1 – Missing Authorization via delete_pageview

Affected Software: Slimstat Analytics
CVE ID: CVE-2023-33994
CVSS Score: 4.3 (Medium)
Researcher/s: Rafshanzani Suhada
Patch Status: Patched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/cbb8501e-7e8b-4ed6-8792-c685a69de982

Lock User Account <= 1.0.3 – Cross-Site Request Forgery to Account Lock/Unlock

Affected Software: Lock User Account
CVE ID: CVE-2023-4307
CVSS Score: 4.3 (Medium)
Researcher/s: Dmitrii Ignatyev
Patch Status: Unpatched
Vulnerability Details: https://wordfence.com/threat-intel/vulnerabilities/id/d06f265c-c1c1-4316-9526-3392f6ee31da

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Click here to sign-up for our mailing list to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post Wordfence Intelligence Weekly WordPress Vulnerability Report (August 21, 2023 to August 27, 2023) appeared first on Wordfence.

Introducing Free Wordfence Intelligence WordPress Vulnerability Webhook Notifications!

We’re incredibly excited to announce that we have launched a webhook integration for vulnerabilities as part of Wordfence Intelligence, which enables users to stay on top of the latest vulnerabilities being added to the Wordfence Intelligence WordPress Vulnerability database, all completely for free! This webhook feature makes it possible for users to receive real-time updates sent to a URL of their choice whenever new vulnerabilities are added to the Wordfence Intelligence WordPress Vulnerability Database, along with updates when vulnerability records are updated or deleted. In addition, our system can send new vulnerability notifications directly to a Slack or Discord channel based on pre-configured webhooks.

Wait, did you say free? Yes! This is a completely free to use feature. When we launched the public interface for Wordfence Intelligence and made API access to the vulnerability database free last December, our mission was to make our commercial high-quality WordPress vulnerability information easy to access for all users of the community and that mission hasn’t changed. Whether you’re an individual site owner making sure no vulnerabilities are present on your site, a security researcher looking to stay on top of the latest vulnerabilities, or an enterprise or developer looking to integrate quality vulnerability information into their platform or software, the Wordfence Intelligence Vulnerability Database is there to serve those needs for free.

Every vulnerability record added to the database is manually curated and validated by our team of highly credentialed and industry leading vulnerability researchers. We monitor as many vulnerability sources as possible including other WordPress vulnerability databases, changeset references, plugin closures, the CVE list, and more to ensure we remain on top of all the latest vulnerabilities affecting the WordPress ecosystem, as well as conducting our own in-house research to positively contribute to the security of the WordPress ecosystem. Our free database is one of the most complete WordPress vulnerability databases on the market with CVSS scores, detailed descriptions, succinct titles, references to affected code/changesets, and more, providing our users with the most accurate and high-quality information available to secure their sites or clients.

Getting Started With Webhooks Today

In order to get started with setting up a webhook integration, you need to have an account on http://www.wordfence.com which can be created at https://www.wordfence.com/sign-in/?action=register

Once registered and logged in, you can access http://www.wordfence.com/account/integrations where you should see the following page to manage the Webooks Integration:

Once ready to configure a webhook, you can click the ‘Add Webhook’ button in the top right corner where you should see the following prompt:

Here you have the option to configure what notifications you’d like to receive. ‘Create’ will send the entire JSON formatted record of any new vulnerability entries in our database to the configured URL, while ‘Replace’ will send the entire JSON formatted record of any modified vulnerabilities, and ‘Delete’ will send the UUID for any vulnerability records that have been deleted.

If you opt to format the data for Discord/Slack, you may only receive ‘Create’ events, which occur when new vulnerabilities are added to the database.

You also have the ability to generate and define a secret that can be used to sign any sent payloads with an HMAC signature, which can be used to verify the authenticity and integrity of the data being sent to your application.

Once a webhook has been configured, you’ll be able to view the last status code to verify things are running as expected, and have the option to edit, test, and view the logs for each configured webhook. You may also delete any webhook integration, or edit and disable any integrations. There is currently no limit to how many webhooks you can have configured.

If you are utilizing the webhook updates to maintain a local database of vulnerabilities, we recommend you do a one-time dump of vulnerabilities using the Wordfence Intelligence vulnerability API and then monitor the creations, updates, and deletions using a webhook integration.

If you’d simply like to stay on top of the latest vulnerabilities, we recommend using the Slack/Discord integration that pre-formats the data and sends it directly to the supplied webhook channel integration. The data will appear in your Slack/Discord channel like so:

You can find all of the technical documentation for creating webhook integrations at: https://www.wordfence.com/help/wordfence-intelligence-webhook-notifications/ 

Conclusion

We are incredibly excited about the launch of this feature as we know that it will enable more site owners, security researchers, developers, and enterprises to more effectively implement vulnerability monitoring and notifications. This in turn will have a positive impact on the WordPress ecosystem and security of the internet as a whole.

On a final note, we’d like to say a special thank you to our Premium, Care, and Response customers that make providing this vulnerability information to the community for free possible. Without your support and trust, we wouldn’t be able to provide completely free access to some of the best vulnerability information available on the market with the Wordfence Intelligence Vulnerability Database. All while continuing to create and provide integrations that make access to WordPress vulnerability information as seamless as possible for everyone.

The post Introducing Free Wordfence Intelligence WordPress Vulnerability Webhook Notifications! appeared first on Wordfence.

Introducing Wordfence CLI: A High Performance Malware Scanner Built for the Command Line

Today, we are incredibly excited to announce the launch of Wordfence CLI: an open source, high performance malware scanner built for the command-line. With Wordfence CLI you can detect malware and other indicators of compromise on a host system by running an extremely fast scanner that is at home in the Linux command line environment. This provides site owners, security administrators, operations teams, and security focused organizations more performance and flexibility in malware detection.

While the Wordfence plugin continues to provide industry leading security with its Web Application Firewall, 2-Factor Authentication, IP Blocklist, Malware Scanner, and other security features, Wordfence CLI can be used to provide a second layer of detection for malware or provide an option for those who choose not to utilize a security plugin.

Wordfence CLI does not provide the firewall, two-factor authentication, brute force protection and other security features that the Wordfence Free and Paid plugin provides. Wordfence CLI is purely focused on high performance, scalable and scriptable malware detection.

Wordfence CLI is for the following customers:

  • Individual site owners comfortable on the Linux command line, who choose to run (or schedule) high performance malware scans on the command line instead of using the malware scanning built into the Wordfence plugin.
  • Site cleaners who need a high performance malware scanner to scan a large number of files as part of remediation.
  • Developers providing hosting to several customers and who want to configure high performance scans in the Linux environment.
  • Hosting companies small and large that want to parallelize scanning across thousands or millions of hosts, fully utilizing all available CPU cores and IO throughput.
  • Operations teams in any organization who are looking for a highly configurable command line scanner that can slot right in to a comprehensive, scheduled and scripted security policy.

Wordfence CLI aims to provide the fastest PHP malware scanner in the world with the highest detection rate, in an scriptable tool that can work in concert with other tools and utilities in the Linux command line environment.

What is Wordfence CLI?

Malware Detection Designed with Performance in Mind

Under the hood, Wordfence CLI is a multi-process malware scanner written in Python. It’s designed to have low memory overhead while being able to utilize multiple cores for scanning large filesystems for malware. We’ve opted to use libpcre over Python’s existing regex libraries for speed and compatibility with our signature set.

From some of our own benchmarks, we’ve seen ~324 files per second and  approximately 13 Megabytes scanned per second using 16 workers on an AMD Ryzen 7 1700 with 8 Cores utilizing our full commercial signature set of over 5,000 malware signatures. That is approximately 46 Gigabytes per hour on modest hardware.

Here are some examples of Wordfence CLI in action.

Performing a basic scan of a single directory in a file system:

wordfence scan --output-path /home/wordfence/wordfence-cli.csv /var/www

This will recursively scan files in the /var/www directory and write the results of the scan in CSV format to /home/wordfence/wordfence-cli.csv. A scan like this could be scheduled using a cron job to be performed daily, which would be similar to how the Wordfence plugin performs scans. Additionally, we can use other utilities like find to select which files we want to scan using Wordfence CLI:

find /var/www/ -cmin -60 -type f -print0 | wordfence scan --output-path /home/wordfence/wordfence-cli.csv

In this example, we can find which files have been changed within the last hour and pipe those from the find command to Wordfence CLI for scanning. It is recommended that you use ctime over mtime and atime as changing the ctime of a file requires root access to the file system. mtime and atime can be arbitrarily set by the file owner using the touch command.

We don’t recommend solely scanning recently changed files on your file system. We frequently add new malware signatures to Wordfence CLI, and we therefore recommend periodically performing a full scan of your filesystem.

Flexibility at Your Fingertips

One key benefit of Wordfence CLI is flexibility. The tool comes with many options that enable users to utilize the output of the scan in various ways.

Some of these options include the ability to:

  • Format output in various ways like CSV, TSV, human readable, and more
  • Choose a number of workers based on available CPUs, that can increase speed and performance of a scan.
  • Include or skip certain files and directories from a scan.
  • Look for all malware signature matches in each file, or immediately stop scanning a file if we find malware (the default).
  • Include or exclude specific signatures from a scan.
  • And much more.

For more information on all of the options available, we recommend reviewing our help documentation at https://www.wordfence.com/help/wordfence-cli/, or downloading Wordfence CLI and running wordfence scan --help

How Wordfence CLI Licensing Works

Wordfence CLI comes in two primary license types, Wordfence CLI Free and Wordfence CLI Commercial.

Wordfence CLI Free is free for individual use and can not be used in a commercial setting. The free version uses our Free Signature Set which is a smaller set of signatures appropriate for entry-level malware detection. Wordfence CLI Free is a great way to get familiar with the tool and to conduct quick scans.

Wordfence CLI Commercial includes our Commercial Signature Set of over 5,000 malware signatures, and can be used in any commercial setting. We release new malware signatures in real-time to our commercial customers. For a sense of scale, our team has released over 100 new malware signatures in the past four months.

Wordfence CLI Commercial includes product support from our world-class Customer Support Engineers.

Wordfence CLI Commercial is available in four pricing tiers:

  • CLI-100 can be used to scan up to 100 unique sites, at just $299 per year.
  • CLI-1,000 can be used to scan up to 1,000 different sites, at just $950 per year.
  • CLI-10,000 can be used to scan up to 10,000 different sites, at just $2,950 per year.
  • CLI-Enterprise which is tailored to any organization or enterprise use case, where the number of sites to be scanned exceeds 10,000. Please contact us at presales@wordfence.com if you are interested in this option.

We trust that users will self-select into the appropriate CLI tier based on the number of sites they need to scan within the license year. You can sign up for a Wordfence CLI free license, or purchase a Wordfence CLI Commercial license at: https://www.wordfence.com/products/wordfence-cli

Contributing to Open Source

Wordfence was founded on a commitment to building and maintaining open source software, and Wordfence CLI is no different. This is why we’ve decided to release the Wordfence CLI application under the GPLv3 license. You can clone the repository here:

https://github.com/wordfence/wordfence-cli/

We’ve also included documentation about how to install, configure, and run Wordfence CLI here:

https://www.wordfence.com/help/wordfence-cli/

Come see us at WordCamp US!

Wordfence is a proud Admin level sponsor at WordCamp US in Maryland this year. Join us in celebrating our launch of Wordfence CLI by stopping by our booth and saying hi! We’ll be there 8AM – 5PM tomorrow (Friday) and 8AM – 3:30PM on Saturday. We’ll have team members from Engineering, Threat Intelligence, Customer Service, Operations, and Security who will be happy to answer any questions you have about the launch of Wordfence CLI. We can also help with any questions about our current product lineup which includes Wordfence Premium, Wordfence Care, and Wordfence Response along with Wordfence Intelligence. If the rumors are true, we might even be teaching the public how to pick locks, and you might have the opportunity to win your own lock picking set if you can crack it.

The post Introducing Wordfence CLI: A High Performance Malware Scanner Built for the Command Line appeared first on Wordfence.

Pin It on Pinterest