Description
WordPress Plugin Wordfence Security-Firewall & Malware Scan is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, or to perform otherwise restricted actions and subsequently bypass author enumeration prevention by using invalid parameters. WordPress Plugin Wordfence Security-Firewall & Malware Scan version 7.1.12 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 7.1.14 or latest
References
http://www.waraxe.us/advisory-109.html
https://seclists.org/fulldisclosure/2018/Oct/38
https://packetstormsecurity.com/files/149845/WordPress-Wordfence-7.1.12-XSS-Username-Disclosure.html
https://wordpress.org/support/topic/wordfence-7-1-12-username-enumeration-prevention-bypass/
https://plugins.svn.wordpress.org/wordfence/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin Interactive Geo Maps Cross-Site Scripting (1.5.10)
WordPress Plugin Media from FTP PHP Object Injection (9.79)
WordPress Plugin OpenID Connect Generic Client Cross-Site Scripting (3.8.1)
Oracle JRE CVE-2013-0430 Vulnerability (CVE-2013-0430)
Apache HTTP Server Out-of-bounds Read Vulnerability (CVE-2017-7668)