Since last week, only 30 total vulnerabilities emerged in public disclosure, but they include the popular Advanced Custom Fields (ACF) plugin. ACF is used on over two million active WordPress sites. Fortunately, a patch is available immediately for ACF and 27 other plugin vulnerabilities, so run those updates if you’re affected!
Additionally, there are two plugin vulnerabilities with no patch available yet. If you use an unpatched plugin or theme, check their vendors’ intentions and progress on a security release. Suppose no patch is forthcoming or the vulnerable software has been marked “closed” and dropped from the official WordPress theme and plugin repositories. In that case, you should consider deactivation and removal in favor of alternative solutions.

WEBINAR REPLAY NOW AVAILABLE
New research from Snicco, WeWatchYourWebsite, Automattic-backed GridPane, and PatchStack claims WordPress security plugins with malware scanners are fundamentally flawed. And they’re being actively defeated by malware in the wild right now!
In this webinar replay, StellarWP technical writer Dan Knauss explains the problem with malware scanners and the WordPress security best practices you need to implement to keep your sites truly safe.
WordPress Core News
WordPress 6.3 “Lionel” is out! This new release of WordPress was built to help you “create beautiful and compelling websites more efficiently than ever.” See what’s new in WordPress 6.3.
Don’t forget to fully back up your website before installing WordPress 6.3. BackupBuddy, the industry-leading data protection and recovery solution for WordPress, will help you build a strong backup strategy to manage all updates. Embrace the enhanced content creation experience of WordPress 6.3 with confidence — and a backup copy of your website safely stored on a remote server.
WordPress Core Vulnerabilities — Patched
WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins not updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new vulnerabilities that have emerged in plugins, themes, and/or WordPress core since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you find vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.
These reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.
Get the weekly WordPress Vulnerability Report delivered to your inbox each Wednesday.
WordPress Plugin Vulnerabilities — Patched
In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!
These vulnerabilities have been disclosed and scored for their severity, thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, representing the largest target for attackers.
Advanced Custom Fields
- Plugin Slug
- advanced-custom-fields
- Installations
- 2,000,000+
- Vulnerability
- Authenticated Cross Site Scripting (XSS)
- Patched in Version
- 6.1.8
- Severity Score
- Medium
Duplicate Post
- Plugin Slug
- copy-delete-posts
- Installations
- 200,000+
- Vulnerability
- Cross Site Request Forgery (CSRF) via AJAX action
- Patched in Version
- 1.4.2
- Severity Score
- Medium
TI WooCommerce Wishlist
- Plugin Slug
- ti-woocommerce-wishlist
- Installations
- 100,000+
- Vulnerability
- Unauthenticated Blind SQL Injection via Rest API
- Patched in Version
- 2.7.4
- Severity Score
- Critical
Change WP Admin
- Plugin Slug
- change-wp-admin-login
- Installations
- 90,000+
- Vulnerability
- Secret Login Page Disclosure
- Patched in Version
- 1.1.4
- Severity Score
- Medium
The Post Grid
- Plugin Slug
- the-post-grid
- Installations
- 60,000+
- Vulnerability
- Cross Site Request Forgery (CSRF) Leading To CSS Change
- Patched in Version
- 7.2.8
- Severity Score
- Medium
PostX – Gutenberg Post Grid Blocks
- Plugin Slug
- ultimate-post
- Installations
- 30,000+
- Vulnerability
- Reflected Cross Site Scripting (XSS)
- Patched in Version
- 3.0.6
- Severity Score
- High
Media from FTP
- Plugin Slug
- media-from-ftp
- Installations
- 20,000+
- Vulnerability
- Improper Privilege Management
- Patched in Version
- 11.16
- Severity Score
- Medium
Themesflat Addons For Elementor
- Plugin Slug
- themesflat-addons-for-elementor
- Installations
- 20,000+
- Vulnerability
- Unauthenticated PHP Object Injection
- Patched in Version
- 2.0.1
- Severity Score
- High
WP Ultimate CSV Importer
- Plugin Slug
- wp-ultimate-csv-importer
- Installations
- 20,000+
- Vulnerability
- Authenticated Arbitrary Usermeta Update to Privilege Escalation
- Patched in Version
- 7.9.9
- Severity Score
- Medium
WP Ultimate CSV Importer
- Plugin Slug
- wp-ultimate-csv-importer
- Installations
- 20,000+
- Vulnerability
- Sensitive Information Exposure via Directory Listing
- Patched in Version
- 7.9.9
- Severity Score
- High
WP Ultimate CSV Importer
- Plugin Slug
- wp-ultimate-csv-importer
- Installations
- 20,000+
- Vulnerability
- Authenticated PHP file upload to Remote Code Execution (RCE)
- Patched in Version
- 7.9.9
- Severity Score
- High
WP Ultimate CSV Importer
- Plugin Slug
- wp-ultimate-csv-importer
- Installations
- 20,000+
- Vulnerability
- Authenticated Remote Code Execution (RCE)
- Patched in Version
- 7.9.9
- Severity Score
- High
Booking Package
- Plugin Slug
- booking-package
- Installations
- 10,000+
- Vulnerability
- Reflected Cross Site Scripting (XSS)
- Patched in Version
- 1.6.02
- Severity Score
- High
Stripe Payment Plugin for WooCommerce
- Plugin Slug
- payment-gateway-stripe-and-woocommerce-integration
- Installations
- 10,000+
- Vulnerability
- Authentication Bypass
- Patched in Version
- 3.7.8
- Severity Score
- Critical
Simple Blog Card
- Plugin Slug
- simple-blog-card
- Installations
- 3,000+
- Vulnerability
- Sensitive Data Exposure
- Patched in Version
- 1.32
- Severity Score
- Medium
Simple Blog Card
- Plugin Slug
- simple-blog-card
- Installations
- 3,000+
- Vulnerability
- Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
- Patched in Version
- 1.31
- Severity Score
- Medium
Leyka
- Plugin Slug
- leyka
- Installations
- 2,000+
- Vulnerability
- Reflected Cross Site Scripting (XSS)
- Patched in Version
- 3.30.3
- Severity Score
- High
Photo Gallery by Ays – Responsive Image Gallery
- Plugin Slug
- gallery-photo-gallery
- Installations
- 1,000+
- Vulnerability
- Cross Site Request Forgery (CSRF)
- Patched in Version
- 5.2.7
- Severity Score
- Medium
Sign-up Sheets
- Plugin Slug
- sign-up-sheets
- Installations
- 1,000+
- Vulnerability
- Cross Site Request Forgery (CSRF)
- Patched in Version
- 2.2.9
- Severity Score
- Medium
Upload Media By URL
- Plugin Slug
- upload-media-by-url
- Installations
- 1,000+
- Vulnerability
- Cross Site Request Forgery (CSRF)
- Patched in Version
- 1.0.8
- Severity Score
- Medium
Bus Ticket Booking with Seat Reservation
- Plugin Slug
- bus-ticket-booking-with-seat-reservation
- Installations
- 900+
- Vulnerability
- Reflected Cross Site Scripting (XSS)
- Patched in Version
- 5.2.4
- Severity Score
- High
Simple Ticker
- Plugin Slug
- simple-ticker
- Installations
- 400+
- Vulnerability
- Authenticated (Contributor+) Stored Cross Site Scripting (XSS)
- Patched in Version
- 3.06
- Severity Score
- Medium
Job Board and Recruitment Plugin – JobWP
- Plugin Slug
- jobwp
- Installations
- 300+
- Vulnerability
- Arbitrary File Upload
- Patched in Version
- 2.1
- Severity Score
- Critical
wpShopGermany – Protected Shops
- Plugin Slug
- wpshopgermany-protectedshops
- Installations
- 40+
- Vulnerability
- Cross Site Scripting (XSS)
- Patched in Version
- 2.1
- Severity Score
- Medium
JetElements For Elementor
- Plugin
- JetElements For Elementor
- Plugin Slug
- jet-elements
- Vulnerability
- Authenticated Remote Code Execution (RCE)
- Patched in Version
- 2.6.11
- Severity Score
- Critical
Shop as a Customer for WooCommerce
- Plugin
- Shop as a Customer for WooCommerce
- Plugin Slug
- shop-as-a-customer-for-woocommerce
- Vulnerability
- Shop Manager+ Privilege Escalation
- Patched in Version
- 1.2.4
- Severity Score
- High
Shop as a Customer for WooCommerce
- Plugin
- Shop as a Customer for WooCommerce
- Plugin Slug
- shop-as-a-customer-for-woocommerce
- Vulnerability
- Subscriber+ Privilege Escalation
- Patched in Version
- 1.1.8
- Severity Score
- High
Simple Share Follow Button
- Plugin Slug
- simple-share-follow-button
- Vulnerability
- Authenticated (Contributor+) Stored Cross Site Scripting (XSS) via Shortcode
- Patched in Version
- 1.04
- Severity Score
- Medium
WordPress Plugin Vulnerabilities — Unpatched
This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.
Booster for Woocommerce
- Plugin Slug
- woocommerce-jetpack
- Installations
- 60,000+
- Vulnerability
- Shop Manager+ Arbitrary Option Update
- Patched in Version
- No Fix
- Severity Score
- High
Front Editor
- Plugin Slug
- front-editor
- Installations
- 200+
- Vulnerability
- Authenticated Stored Cross Site Scripting (XSS)
- Patched in Version
- No Fix
- Severity Score
- Medium
WordPress Theme Vulnerabilities
In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information we provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you must find an alternative theme. Deactivate and delete persistently unpatched themes and those marked “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, delete it.

Dan Knauss is StellarWP’s Technical Content Generalist. He’s been a writer, teacher, and freelancer working in open source since the late 1990s and with WordPress since 2004.