Site icon API Security Blog

Wordfence Intelligence Weekly WordPress Vulnerability Report (August 21, 2023 to August 27, 2023)

Last week, there were 43 vulnerabilities disclosed in 38 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 23 Vulnerability Researchers that contributed to WordPress Security last week. **Review those vulnerabilities in this report now to ensure your site is not affected.**

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence [user interface](), [vulnerability API]() and [webhook notifications]() are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

_[Click here to sign-up for our mailing list]() to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _

* * *

### New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our [Premium](), [Care](), and [Response]() customers last week:

* [JupiterX Core <= 3.3.8 – Unauthenticated Privilege Escalation]()

Wordfence [Premium](), [Care](), and [Response]() customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.

* * *

### Total Unpatched & Patched Vulnerabilities Last Week

**Patch Status** | **Number of Vulnerabilities**
—|—
Unpatched | 17
Patched | 26

* * *

### Total Vulnerabilities by CVSS Severity Last Week

**Severity Rating** | **Number of Vulnerabilities**
—|—
Low Severity | 0
Medium Severity | 35
High Severity | 6
Critical Severity | 2

* * *

### Total Vulnerabilities by CWE Type Last Week

**Vulnerability Type by CWE** | **Number of Vulnerabilities**
—|—
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 16
Missing Authorization | 13
Cross-Site Request Forgery (CSRF) | 8
Unrestricted Upload of File with Dangerous Type | 2
Reliance on Untrusted Inputs in a Security Decision | 1
Authentication Bypass Using an Alternate Path or Channel | 1
Use of Less Trusted Source | 1
Improper Privilege Management | 1

* * *

### Researchers That Contributed to WordPress Security Last Week

**Researcher Name** | **Number of Vulnerabilities**
—|—
[Rafshanzani Suhada]() | 6
[Abdi Pranata]() | 3
[Rio Darmawan]() | 3
[Rafie Muhammad]() | 3
[Mahesh Nagabhairava]() | 2
[Nguyen Xuan Chien]() | 2
[yuyuddn]() | 1
[Bob Matyas]() | 1
[Carlos David Garrido León]() | 1
[Skalucy]() | 1
[Nithissh S]() | 1
[Animesh Gaurav]() | 1
[Muhammad Daffa]() | 1
[konagash]() | 1
[Dipak Panchal]() | 1
[Bartłomiej Marek]() | 1
[Tomasz Swiadek]() | 1
[An Dang]() | 1
[Erwan LR]() | 1
[Mika]() | 1
[Lana Codes]()
(Wordfence Vulnerability Researcher) | 1
[Dmitrii Ignatyev]() | 1
[Revan Arifio]() | 1

_Are you a security researcher who would like to be featured in our weekly vulnerability report?_ You can responsibly disclose your WordPress vulnerability discoveries to us and [obtain a CVE ID through this form](). Responsibly disclosing your vulnerability discoveries to us will also get your name added on the [Wordfence Intelligence leaderboard]() along with being mentioned in our weekly vulnerability report.

* * *

### WordPress Plugins with Reported Vulnerabilities Last Week

**Software Name** | **Software Slug**
—|—
Category Slider for WooCommerce | [woo-category-slider-grid]()
Collapse-O-Matic | [jquery-collapse-o-matic]()
Cookies by JM | [cookies-by-jm]()
DX-auto-save-images | [dx-auto-save-images]()
DoLogin Security | [dologin]()
ElementsKit Elementor addons | [elementskit-lite]()
FTP Access | [ftp-access]()
FV Flowplayer Video Player | [fv-wordpress-flowplayer]()
Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager | [folders]()
Herd Effects – fake notifications and social proof plugin | [mwp-herd-effect]()
Hide My WP Ghost – Security Plugin | [hide-my-wp]()
Jupiter X Core | [jupiterx-core]()
Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages | [page-builder-add]()
Leyka | [leyka]()
Lock User Account | [lock-user-account]()
Master Addons for Elementor | [master-addons]()
MasterStudy LMS WordPress Plugin – for Online Courses and Education | [masterstudy-lms-learning-management-system]()
Min Max Control – Min Max Quantity & Step Control for WooCommerce | [woo-min-max-quantity-step-control-single]()
Post and Page Builder by BoldGrid – Visual Drag and Drop Editor | [post-and-page-builder]()
Posts Like Dislike | [posts-like-dislike]()
Premmerce User Roles | [premmerce-user-roles]()
Push Notification for Post and BuddyPress | [push-notification-for-post-and-buddypress]()
ReviewX – Multi-criteria Rating & Reviews for WooCommerce | [reviewx]()
Royal Elementor Addons and Templates | [royal-elementor-addons]()
Save as Image plugin by Pdfcrowd | [save-as-image-by-pdfcrowd]()
Save as PDF plugin by Pdfcrowd | [save-as-pdf-by-pdfcrowd]()
Secure Admin IP | [secure-admin-ip]()
Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management | [simple-urls]()
Slimstat Analytics | [wp-slimstat]()
Sticky Social Media Icons | [sticky-social-media-icons]()
Translate WordPress with GTranslate | [gtranslate]()
URL Shortify – Simple, Powerful and Easy URL Shortener Plugin For WordPress | [url-shortify]()
Vertical marquee plugin | [vertical-marquee-plugin]()
Void Elementor Post Grid Addon for Elementor Page builder | [void-elementor-post-grid-addon-for-elementor-page-builder]()
WP Adminify – WordPress Dashboard Customization | Custom Login | Admin Columns | Dashboard Widget | Media Library Folders | [adminify]()
WP VK-付费内容插件(付费阅读/资料/工具软件资源管理) | [wp-vk]()
gAppointments – Appointment booking addon for Gravity Forms | [gAppointments]()
iThemes Sync | [ithemes-sync]()

* * *

### Vulnerability Details

Please note that if you run the Wordfence plugin on your WordPress site, with the scanner enabled, you should’ve already been notified if your site was affected by any of these vulnerabilities.

#### [JupiterX Core <= 3.3.5 – Unauthenticated Arbitrary File Upload]()

**Affected Software**: [Jupiter X Core]()
**CVE ID**: CVE-2023-38388
**CVSS Score**: 9.8 (Critical)
**Researcher/s**: [Rafie Muhammad]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [JupiterX Core <= 3.3.8 – Unauthenticated Privilege Escalation]()

**Affected Software**: [Jupiter X Core]()
**CVE ID**: CVE-2023-38389
**CVSS Score**: 9.8 (Critical)
**Researcher/s**: [Rafie Muhammad]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Folders <= 2.9.2 – Authenticated (Author+) Arbitrary File Upload]()

**Affected Software**: [Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager]()
**CVE ID**: CVE Unknown
**CVSS Score**: 8.8 (High)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Premmerce User Roles <= 1.0.12 – Missing Authorization via role management functions]()

**Affected Software**: [Premmerce User Roles]()
**CVE ID**: CVE-2023-41130
**CVSS Score**: 8.3 (High)
**Researcher/s**: [Nguyen Xuan Chien]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Master Addons for Elementor <= 2.0.3 – Missing Authorization]()

**Affected Software**: [Master Addons for Elementor]()
**CVE ID**: CVE-2023-40679
**CVSS Score**: 7.3 (High)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [MasterStudy LMS <= 3.0.17 – Privilege Escalation]()

**Affected Software**: [MasterStudy LMS WordPress Plugin – for Online Courses and Education]()
**CVE ID**: CVE-2023-4278
**CVSS Score**: 7.3 (High)
**Researcher/s**: [Revan Arifio]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Simple URLs <= 117 – Unauthenticated Cross-Site Scripting]()

**Affected Software**: [Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management]()
**CVE ID**: CVE-2023-40667
**CVSS Score**: 7.2 (High)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [URL Shortify <= 1.7.5 – Unauthenticated Stored Cross-Site Scripting via Referrer Header]()

**Affected Software**: [URL Shortify – Simple, Powerful and Easy URL Shortener Plugin For WordPress]()
**CVE ID**: CVE-2023-4294
**CVSS Score**: 7.2 (High)
**Researcher/s**: [Bartłomiej Marek](), [Tomasz Swiadek]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Collapse-O-Matic <= 1.8.4 – Authenticated (Contributor+) Stored Cross-Site Scripting]()

**Affected Software**: [Collapse-O-Matic]()
**CVE ID**: CVE-2023-40669
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Simple URLs <= 117 – Authenticated (Contributor+) Stored Cross-Site Scripting]()

**Affected Software**: [Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management]()
**CVE ID**: CVE-2023-40674
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [FTP Access <= 1.0 – Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting]()

**Affected Software**: [FTP Access]()
**CVE ID**: CVE-2023-3510
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Bob Matyas]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [gAppointments – Appointment booking addon for Gravity Forms <= 1.9.7 – Reflected Cross-Site Scripting]()

**Affected Software**: [gAppointments – Appointment booking addon for Gravity Forms]()
**CVE ID**: CVE-2023-2705
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Carlos David Garrido León]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Min Max Control <= 4.5 – Reflected Cross-Site Scripting]()

**Affected Software**: [Min Max Control – Min Max Quantity & Step Control for WooCommerce]()
**CVE ID**: CVE-2023-4270
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Animesh Gaurav]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Elements kit Elementor addons <= 2.9.1 – Missing Authorization]()

**Affected Software**: [ElementsKit Elementor addons]()
**CVE ID**: CVE-2023-39993
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Rafie Muhammad]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [FV Flowplayer Video Player <= 7.5.37.7212 – Insufficient Input Validation to Unauthenticated Stored Cross-Site Scripting and Arbitrary Usermeta Update]()

**Affected Software**: [FV Flowplayer Video Player]()
**CVE ID**: CVE-2023-4520
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Void Elementor Post Grid Addon for Elementor Page builder <= 2.1.10 – Missing Authorization to Review Notice Dismissal]()

**Affected Software**: [Void Elementor Post Grid Addon for Elementor Page builder]()
**CVE ID**: CVE Unknown
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Push Notification for Post and BuddyPress <= 1.63 – Missing Authorization to Unauthenticated Admin Notice Dismissal]()

**Affected Software**: [Push Notification for Post and BuddyPress]()
**CVE ID**: CVE Unknown
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Hide My WP Ghost <= 5.0.25 – CAPTCHA Bypass in brute_math_authenticate]()

**Affected Software**: [Hide My WP Ghost – Security Plugin]()
**CVE ID**: CVE-2023-34001
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: [konagash]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Posts Like Dislike <= 1.1.1 – Missing Authorization to Authenticated (Subscriber+) Plugin Setting Reset]()

**Affected Software**: [Posts Like Dislike]()
**CVE ID**: CVE Unknown
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Secure Admin IP <= 2.0 – Missing Authorization via ‘saveSettings’]()

**Affected Software**: [Secure Admin IP]()
**CVE ID**: CVE-2023-41133
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: [Mika]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [DoLogin Security <= 3.6 – IP Address Spoofing]()

**Affected Software**: [DoLogin Security]()
**CVE ID**: CVE Unknown
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Vertical Marquee Plugin <= 7.1 – Authenticated (Administrator+) Stored Cross-Site Scripting]()

**Affected Software**: [Vertical marquee plugin]()
**CVE ID**: CVE-2023-40677
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [yuyuddn]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Cookies by JM <= 1.0 – Authenticated (Administrator+) Stored Cross-Site Scripting]()

**Affected Software**: [Cookies by JM]()
**CVE ID**: CVE-2023-40604
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Nithissh S]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Slimstat Analytics <= 5.0.8 – Authenticated (Administrator+) Stored Cross-Site Scripting via settings]()

**Affected Software**: [Slimstat Analytics]()
**CVE ID**: CVE-2023-40676
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Rio Darmawan]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Save as PDF plugin by Pdfcrowd <= 2.16.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings]()

**Affected Software**: [Save as PDF plugin by Pdfcrowd]()
**CVE ID**: CVE-2023-40668
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Mahesh Nagabhairava]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [GTranslate <= 3.0.3 – Authenticated (Administrator+) Cross-Site Scripting via Multiple Parameters]()

**Affected Software**: [Translate WordPress with GTranslate]()
**CVE ID**: CVE Unknown
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [WP Adminify <= 3.1.5 – Authenticated (Admin+) Stored Cross-Site Scripting]()

**Affected Software**: [WP Adminify – WordPress Dashboard Customization | Custom Login | Admin Columns | Dashboard Widget | Media Library Folders]()
**CVE ID**: CVE-2023-4060
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Dipak Panchal]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Save as Image plugin by Pdfcrowd <= 2.16.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via settings]()

**Affected Software**: [Save as Image plugin by Pdfcrowd]()
**CVE ID**: CVE-2023-40665
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Mahesh Nagabhairava]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Leyka <= 3.30.3 – Authenticated (Administrator+) Stored Cross-Site Scripting]()

**Affected Software**: [Leyka]()
**CVE ID**: CVE-2023-2995
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [An Dang]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Landing Page Builder <= 1.5.1.1 – Authenticated (Administrator+) Stored Cross-Site Scripting]()

**Affected Software**: [Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages]()
**CVE ID**: CVE-2023-40675
**CVSS Score**: 4.4 (Medium)
**Researcher/s**: [Rio Darmawan]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [WP VK-付费内容插件 <= 1.3.3 – Cross-Site Request Forgery via AJions]()

**Affected Software**: [WP VK-付费内容插件(付费阅读/资料/工具软件资源管理)]()
**CVE ID**: CVE Unknown
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [iThemes Sync <= 2.1.13 – Cross-Site Request Forgery and Missing Authorization via ‘hide_authenticate_notice’]()

**Affected Software**: [iThemes Sync]()
**CVE ID**: CVE-2023-40001
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Abdi Pranata]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Simple URLs <= 117 – Missing Authorization via AJAX actions]()

**Affected Software**: [Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management]()
**CVE ID**: CVE-2023-40678
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [DX-auto-save-images <= 1.4.0 – Cross-Site Request Forgery]()

**Affected Software**: [DX-auto-save-images]()
**CVE ID**: CVE-2023-40671
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Skalucy]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Royal Elementor Addons <= 1.3.75 – Cross-Site Request Forgery]()

**Affected Software**: [Royal Elementor Addons and Templates]()
**CVE ID**: CVE-2022-47175
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Muhammad Daffa]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Sticky Social Media Icons <= 2.0 – Missing Authorization via ajax_request_handle]()

**Affected Software**: [Sticky Social Media Icons]()
**CVE ID**: CVE-2023-40672
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Nguyen Xuan Chien]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [ReviewX <= 1.6.17 – Missing Authorization in rx_coupon_from_submit]()

**Affected Software**: [ReviewX – Multi-criteria Rating & Reviews for WooCommerce]()
**CVE ID**: CVE-2023-40670
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Abdi Pranata]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Herd Effects <= 5.2.3 – Cross-Site Request Forgery to Effect Deletion]()

**Affected Software**: [Herd Effects – fake notifications and social proof plugin]()
**CVE ID**: CVE-2023-4318
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Erwan LR]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Category Slider for WooCommerce <= 1.4.15 – Missing Authorization via notice dismissal functionality]()

**Affected Software**: [Category Slider for WooCommerce]()
**CVE ID**: CVE-2023-41132
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Abdi Pranata]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Simple URLs <= 117 – Cross-Site Request Forgery via AJAX actions]()

**Affected Software**: [Simple URLs – Link Cloaking, Product Displays, and Affiliate Link Management]()
**CVE ID**: CVE Unknown
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Post and Page Builder by BoldGrid – Visual Drag and Drop Editor <= 1.24.1 – Cross-Site Request Forgery via submitDefaultEditor]()

**Affected Software**: [Post and Page Builder by BoldGrid – Visual Drag and Drop Editor]()
**CVE ID**: CVE-2023-25480
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Rio Darmawan]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Slimstat Analytics <= 5.0.5.1 – Missing Authorization via delete_pageview]()

**Affected Software**: [Slimstat Analytics]()
**CVE ID**: CVE-2023-33994
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Lock User Account <= 1.0.3 – Cross-Site Request Forgery to Account Lock/Unlock]()

**Affected Software**: [Lock User Account]()
**CVE ID**: CVE-2023-4307
**CVSS Score**: 4.3 (Medium)
**Researcher/s**: [Dmitrii Ignatyev]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

As a reminder, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

[Click here to sign-up for our mailing list]() to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published.

The post [Wordfence Intelligence Weekly WordPress Vulnerability Report (August 21, 2023 to August 27, 2023)]() appeared first on [Wordfence]().Read More

Exit mobile version