Wordfence Intelligence Weekly WordPress Vulnerability Report (July 7, 2025 to July 13, 2025)

Calling all Vulnerability Researchers and Bug Bounty Hunters! Spring into Summer with Wordfence! Now through August 4, 2025, earn 2X bounty rewards forall in-scope submissions from our 'High Thre ...

Continue Reading
CVE-2024-33832

creation_timestamp| type| source ---|---|--- 2025-07-17 11:51:46+00:00| confirmed|...Read More ...

Continue Reading
CVE-2025-4302 Stop User Enumeration < 1.7.3 – Protection Bypass

The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API...Read Mo ...

Continue Reading
CVE-2024-56339

creation_timestamp| type| source ---|---|--- 2025-07-17 13:20:05+00:00| seen| https://bsky.app/profile/knaepp.bsky.social/post/3lu5zj3fenn2b 2025-07-17 13:30:04+00:00| seen|...Read More ...

Continue Reading
Important: Red Hat Security Advisory: tomcat security update

An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service. Red Hat Product Security ha ...

Continue Reading
Important: Red Hat Security Advisory: tomcat security update

An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulner ...

Continue Reading
ROS-20250717-01

GLPI asset and data center management software vulnerability is related to incorrect access restrictions in the API. Exploitation of the vulnerability could allow an attacker, acting remotely, to gain ...

Continue Reading
CVE-2025-4302

creation_timestamp| type| source ---|---|--- 2025-07-17 10:43:23+00:00| seen|...Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: