Vulnerabilities and security researches forwordfence wordfence
Direction: ascendingJun 07, 2024
Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2014-4664
- CVE, Research URL
- Date
- Nov 06, 2014
- Research Description
- Cross-site scripting (XSS) vulnerability in the Wordfence Security plugin before 5.1.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the whoisval parameter on the WordfenceWhois page to wp-admin/admin.php.
- Affected versions
-
max 5.2.5.
- Status
-
vulnerable
Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2019-9669
- CVE, Research URL
- Date
- Apr 26, 2019
- Research Description
- The Wordfence plugin 7.2.3 for WordPress allows XSS via a unique attack vector. NOTE: It has been asserted that this is not a valid vulnerability in the context of the Wordfence WordPress plugin as the firewall rules are not maintained as part of the Wordfence software but rather it is a set of rules hosted on vendor servers and pushed to the plugin with no versioning associated. Bypassing a WAF rule doesn't make a WordPress site vulnerable (speaking in terms of software vulnerabilities)
- Affected versions
-
max 7.2.3.
- Status
-
vulnerable
Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2014-4932
- CVE, Research URL
- Date
- Aug 28, 2018
- Research Description
- Cross-site scripting (XSS) vulnerability in the Wordfence Security plugin before 5.1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the val parameter to whois.php.
- Affected versions
-
max 5.1.5.
- Status
-
vulnerable
Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2022-3144
- CVE, Research URL
- Date
- Sep 23, 2022
- Research Description
- The Wordfence Security – Firewall & Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.
- Affected versions
-
max 3.8.7.
- Status
-
vulnerable
Feb 04, 2026
Wordfence Security – Firewall, Malware Scan, and Login Security # PSC-2026-64604
- PSC, Research URL
- Date
- Feb 04, 2026
- Research Description
- Wordfence Security (v8.1.4) is one of the most widely deployed WordPress security plugins, combining an endpoint Web Application Firewall (WAF), malware scanning, login hardening (including 2FA), and centralized monitoring capabilities through Wordfence Central. Because a security plugin operates at the most sensitive layers of a WordPress site—authentication flows, request filtering, filesystem integrity checks, and threat detection—its own code integrity and safety are absolutely crucial. That’s why Wordfence Security v8.1.4 achieving CleanTalk Plugin Security Certification (PSC-2026-64604) matters: it indicates the plugin has been audited and validated to meet strong secure-coding expectations and to resist major exploit classes that commonly affect WordPress plugins.
- Affected versions
-
Min 8.1.4, max 8.1.4.
- Status
-
SAFE & CERTIFIED