In case you missed it, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as Wordfence Intelligence Community Edition.

This database is continuously updated, maintained, and populated by Wordfence’s highly credentialed and experienced vulnerability researchers through in-house vulnerability research, vulnerability researchers submitting directly to us using our CVE Request form, and by monitoring varying sources to capture all publicly available WordPress vulnerability information and adding additional context where we can.

Our mission with Wordfence Intelligence Community Edition is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence Community Edition user interface and vulnerability API are completely free to access and utilize both personally and commercially.

Last week, there were 71 vulnerabilities disclosed in WordPress based software that have been added to the Wordfence Intelligence Community Edition Vulnerability Database. You can find those vulnerabilities below.


ImageMagick Engine <= 1.7.5 – Cross-Site Request Forgery to PHAR Deserialization


Plugin for Google Reviews <= 2.2.3 – Authenticated (Subscriber+) SQL Injection


GigPress <= 2.3.28 – Authenticated (Subscriber+) SQL Injection


Auto Featured Image (Auto Post Thumbnail) <= 3.9.15 – Authenticated (Author+) Arbitrary File Upload


My Sticky Elements <= 2.0.8 – Authenticated (Admin+) SQL Injection


Redirection for Contact Form 7 <= 2.7.0 – Authenticated(Editor+) Privilege Escalation


Monolit <= 2.0.6 – Unauthenticated Stored Cross-Site Scripting


Gutenberg Forms <= 2.2.8.3 – Authenticated(Subscriber+) Sensitive Information Disclosure


Shortcodes Ultimate <= 5.12.6 – Authenticated (Subscriber+) Arbitrary File Read via Shortcode


Shortcodes Ultimate <= 5.12.6 – Authenticated (Subscriber+) Server-Side Request Forgery


Cost of Goods for WooCommerce <= 2.8.6 – Missing Authorization in save_costs


Icegram Express <= 5.5.2 – Unauthenticated CSV Injection


Quick Contact Form <= 8.0.3.1 – Cross-Site Request Forgery to Sensitive Information Disclosure


WP-Optimize <= 3.2.11 – Cross-Site Request Forgery


Cost of Goods for WooCommerce <= 2.8.6 – Cross-Site Request Forgery in save_costs


Scriptless Social Sharing <= 3.2.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Block Options


Quick Contact Form <= 8.0.3.1 – Authenticated (Contributor+) Stored Cross-Site Scripting


Icegram Collect <= 1.3.8 – Authenticated(Contributor+) Cross-Site Scripting via Shortcode


Interactive Geo Maps <= 1.5.9 – Authenticated (Editor+) Stored Cross-Site Scripting


Quebely <= 1.8.4 – Authenticated (Contributor+) Stored Cross-Site Scripting via ‘className’ Block Option


Visualizer <= 3.9.1 – Authenticated(Contributor+) Stored Cross-Site Scripting


Shortcodes Ultimate <= 5.12.6 – Authenticated (Contributor+) Stored Cross Site Scripting


WordPress Comments Import & Export <= 2.3.1 – CSV Injection


Pie Register <= 3.8.2.2 – Open Redirect


???????? <= 6.0.1 – Reflectedite Scripting


Link Juice Keeper <= 2.0.2 – Authenticated(Admin+) Stored Cross-Site Scripting


Chained Quiz <= 1.3.2.5 – Authenticated(Admin+) Stored Cross-Site Scripting


Quick Paypal Payments <= 5.7.25 – Authenticated (Administrator+) Stored Cross-Site Scripting


Arigato Autoresponder and Newsletter <= 2.7.1 – Authenticated(Admin+) Stored Cross-Site Scripting


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_add_folder


0mk Shortener <= 0.2 – Cross-Site Request Forgery to Stored Cross-Site Scripting


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_move_object


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_save_state


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_add_folder


Wicked Folders <= 2.18.16 – Missing Authorization via ajax_unassign_folders


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_save_folder


Wicked Folders <= 2.18.16 – Missing Authorization via ajax_delete_folder


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_edit_folder


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_save_folder_order


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery on ajax_save_folder


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_edit_folder


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_delete_folder


Auto Affiliate Links <= 6.2.1.5 – Authenticated(Subscriber+) Plugin Settings Change


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_clone_folder


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_save_folder_order


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_save_sort_order


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_save_sort_order


Wicked Folders <= 2.18.16 – Missing Authorization on ajax_clone_folder


WPCode <= 2.0.6 – Missing Authorization to Sensitive Key Disclosure/Update


Quiz And Survey Master <= 8.0.8 – Cross-Site Request Forgery to Arbitrary Media Deletion


Wicked Folders <= 2.18.16 – Missing Authorization via ajax_save_state


ShopLentor <= 2.5.1 – Cross-Site Request Forgery to Post Updates


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery on ajax_move_object


Wicked Folders <= 2.18.16 – Cross-Site Request Forgery via ajax_unassign_folders


CURCY <= 2.1.25 – Missing Authorization to Currency Exchange Retrieval


Vulnerability: eCommerce Product Catalog plugin for WordPress <= 3.3.4 – Authenticated (Administrator+) Stored Cross-Site Scripting


Under Construction <= 3.96 – Cross-Site Request Forgery via admin_action_ucp_dismiss_notice


Booking Calendar Contact Form <= 1.2.34 – Missing Authorization to Authenticated (Subscriber+) Feedback Form Submission


Booking Calendar Contact Form <= 1.2.34 – Cross-Site Request Forgery via cpdexbccf_feedback


Podlove Podcast Publisher <= 3.8.3 – Cross-Site Request Forgery


A2 Optimized WP <= 3.0.4 – Cross Site Request Forgery


Under Construction <= 3.96 – Cross-Site Request Forgery via admin_action_install_weglot


Void Contact Form 7 Widget For Elementor Page Builder <= 2.1.1 – Cross-Site Request Forgery in void_cf7_opt_in_user_data_track


Ajax Search Lite <= 4.10.3 – Missing Authorization leading to Authenticated (Subscriber+) Sensitive Information Disclosure


Google Maps CP <= 1.0.43 – Cross-Site Request Forgery via feedback_action


All-in-one Google Analytics, Pixels and Product Feed Manager for WooCommerce <= 5.2.3 – Cross-Site Request Forgery


PayPal Brasil para WooCommerce <= 1.4.2 – Cross-Site Request Forgery


Google Maps CP <= 1.0.43 – Missing Authorization to Authenticated (Subscriber+) Feedback Form Submission


Mercado Pago payments for WooCommerce <= 6.3.1 – Cross-Site Request Forgery


Album and Image Gallery plus Lightbox <= 1.6.2 – Cross-Site Request Forgery


ColorWay <= 4.2.3 – Cross Site Request Forgery


If you’d like to receive this weekly vulnerability report by email, along with Wordfence Intelligence CE product updates, sign up to the Wordfence Intelligence Community Edition Newsletter by filling out this form below.


Are you a security researcher who would like to be featured in our weekly vulnerability report? You can responsibly disclose your WordPress vulnerability discoveries to us and obtain a CVE ID through this form. Responsibly disclosing your vulnerability discoveries to us will also get your name added on the Wordfence Intelligence Community Edition leaderboard along with being mentioned in our weekly vulnerability report.