cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwordfence wordfence

Direction: descending
Feb 04, 2026

Wordfence Security – Firewall, Malware Scan, and Login Security # PSC-2026-64604

PSC, Research URL

PSC-2026-64604

Date
Feb 04, 2026
Research Description
Wordfence Security (v8.1.4) is one of the most widely deployed WordPress security plugins, combining an endpoint Web Application Firewall (WAF), malware scanning, login hardening (including 2FA), and centralized monitoring capabilities through Wordfence Central. Because a security plugin operates at the most sensitive layers of a WordPress site—authentication flows, request filtering, filesystem integrity checks, and threat detection—its own code integrity and safety are absolutely crucial. That’s why Wordfence Security v8.1.4 achieving CleanTalk Plugin Security Certification (PSC-2026-64604) matters: it indicates the plugin has been audited and validated to meet strong secure-coding expectations and to resist major exploit classes that commonly affect WordPress plugins.
Affected versions
Min 8.1.4, max 8.1.4.
Status
SAFE & CERTIFIED
Jun 07, 2024

Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2014-4664

CVE, Research URL

CVE-2014-4664

Date
Nov 06, 2014
Research Description
Cross-site scripting (XSS) vulnerability in the Wordfence Security plugin before 5.1.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the whoisval parameter on the WordfenceWhois page to wp-admin/admin.php.
Affected versions
max 5.2.5.
Status
vulnerable

Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2019-9669

CVE, Research URL

CVE-2019-9669

Date
Apr 26, 2019
Research Description
The Wordfence plugin 7.2.3 for WordPress allows XSS via a unique attack vector. NOTE: It has been asserted that this is not a valid vulnerability in the context of the Wordfence WordPress plugin as the firewall rules are not maintained as part of the Wordfence software but rather it is a set of rules hosted on vendor servers and pushed to the plugin with no versioning associated. Bypassing a WAF rule doesn't make a WordPress site vulnerable (speaking in terms of software vulnerabilities)
Affected versions
max 7.2.3.
Status
vulnerable

Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2014-4932

CVE, Research URL

CVE-2014-4932

Date
Aug 28, 2018
Research Description
Cross-site scripting (XSS) vulnerability in the Wordfence Security plugin before 5.1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the val parameter to whois.php.
Affected versions
max 5.1.5.
Status
vulnerable

Wordfence Security – Firewall, Malware Scan, and Login Security # CVE-2022-3144

CVE, Research URL

CVE-2022-3144

Date
Sep 23, 2022
Research Description
The Wordfence Security – Firewall & Malware Scan plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 7.6.0 via a setting on the options page due to insufficient escaping on the stored value. This makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts into the setting that executes whenever a user accesses a page displaying the affected setting on sites running a vulnerable version.
Affected versions
max 3.8.7.
Status
vulnerable