Description
WordPress Plugin Wordfence Security-Firewall & Malware Scan is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, or to perform otherwise restricted actions and subsequently bypass author enumeration prevention by using invalid parameters. WordPress Plugin Wordfence Security-Firewall & Malware Scan version 7.1.12 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 7.1.14 or latest
References
http://www.waraxe.us/advisory-109.html
https://seclists.org/fulldisclosure/2018/Oct/38
https://packetstormsecurity.com/files/149845/WordPress-Wordfence-7.1.12-XSS-Username-Disclosure.html
https://wordpress.org/support/topic/wordfence-7-1-12-username-enumeration-prevention-bypass/
https://plugins.svn.wordpress.org/wordfence/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin WP Symposium Toolbar Unspecified Vulnerability (0.26.0)
WordPress Plugin weForms-Easy Drag & Drop Contact Form Builder For WordPress CSV Injection (1.6.3)
Oracle Database Server CVE-2006-1866 Vulnerability (CVE-2006-1866)
WordPress Plugin File Away Multiple Unspecified Vulnerabilities (3.8.4)