Skip to content
Security

139 WordPress Vulnerabilities Reported: Wordfence’s Latest Update

Wordfence's latest report reveals 139 WordPress vulnerabilities. With 123 plugins and 13 themes affected, security remains a critical concern.

139 WordPress Vulnerabilities Reported: Wordfence’s Latest Update
Photo: RDNE Stock project on Pexels

Some links on this page are affiliate links. We may earn a commission when you click through and make a purchase, at no additional cost to you.

Wordfence’s latest vulnerability report highlights a critical week for WordPress security, with 139 vulnerabilities identified across 123 plugins and 13 themes. As WordPress continues to be a prime target for exploits, this report underscores the importance of staying informed.

The Wordfence Intelligence Vulnerability Database plays a pivotal role in this landscape. Offering a comprehensive and accessible repository of over 33,000 vulnerabilities, Wordfence empowers site owners to implement defense-in-depth strategies. Last week alone, 58 vulnerability researchers contributed to this effort, reinforcing Wordfence’s commitment to securing the WordPress ecosystem.

Wordfence Bug Bounty Program: Incentivizing Security

An attractive component of Wordfence’s strategy is its Bug Bounty Program. Researchers can earn up to $31,200 per vulnerability, encouraging the discovery and reporting of security issues. This initiative not only benefits individual researchers but also strengthens the overall security posture of WordPress by addressing vulnerabilities proactively.

WordPress vulnerabilities
Wordfence's Bug Bounty Program rewards researchers for vulnerability discoveries. — Photo: Negative Space / Pexels

Wordfence’s approach ensures that once vulnerabilities are reported, they are swiftly added to the database, allowing users to take immediate action. This proactive stance is vital in a landscape where the number of disclosed vulnerabilities can reach significant figures, as evidenced by the recent report.

Breakdown of Last Week’s Vulnerabilities

The report categorizes vulnerabilities by severity and type, providing a detailed view of the current threat landscape. Of the 139 vulnerabilities, 66 have been patched, while 73 remain unpatched. The classification by CVSS severity reveals 105 medium, 32 high, and 2 critical vulnerabilities, emphasizing areas that require urgent attention.

Common Vulnerability and Exposure (CWE) types identified include Missing Authorization (51 instances), Cross-site Scripting (40), and SQL Injection (16). These categories highlight persistent security challenges within the WordPress ecosystem.

New Firewall Rules and Protection

In response to these vulnerabilities, Wordfence has deployed new firewall rules. These rules are essential for mitigating risks and are made available in real-time to Premium, Care, and Response customers. Free users will access these enhancements after a 30-day delay, underscoring the benefits of premium protection.

The Wordfence Threat Intelligence Team meticulously evaluates each vulnerability to ensure the firewall’s effectiveness in preventing exploitation. This continuous improvement cycle is crucial for maintaining robust security defenses across the WordPress landscape.

What To Do

  • For Site Owners: Review the latest vulnerabilities and apply patches where available. Consider upgrading to Wordfence Premium for real-time protection.
  • For Developers: Participate in the Bug Bounty Program to identify and report vulnerabilities, contributing to community safety.
  • For Hosting Providers: Utilize the Wordfence CLI Vulnerability Scanner and Database API to monitor and protect client sites effectively.

Related News