Description
WordPress Plugin Wordfence Security-Firewall & Malware Scan is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, or to perform otherwise restricted actions and subsequently bypass author enumeration prevention by using invalid parameters. WordPress Plugin Wordfence Security-Firewall & Malware Scan version 7.1.12 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 7.1.14 or latest
References
http://www.waraxe.us/advisory-109.html
https://seclists.org/fulldisclosure/2018/Oct/38
https://packetstormsecurity.com/files/149845/WordPress-Wordfence-7.1.12-XSS-Username-Disclosure.html
https://wordpress.org/support/topic/wordfence-7-1-12-username-enumeration-prevention-bypass/
https://plugins.svn.wordpress.org/wordfence/trunk/readme.txt
Related Vulnerabilities
MySQL CVE-2020-14836 Vulnerability (CVE-2020-14836)
WordPress Plugin Advertisement Management Multiple Vulnerabilities (1.0)
WordPress Plugin Login Logout Menu Multiple Cross-Site Scripting Vulnerabilities (1.3.3)
Cherokee Cryptographic Issues Vulnerability (CVE-2011-2190)
Django Improper Input Validation Vulnerability (CVE-2011-4139)