WordPress Core News
WordPress 6.1.1 was released on November 15, 2022, as a short-cycle maintenance release with 29 bug fixes in Core and 21 bug fixes for the block editor. Because this is a core update, be sure to update to WordPress 6.1.1 as soon as possible! As always, with a major release like this, it makes sense to ensure your site is backed up with BackupBuddy before updating.
WP
This vulnerability was reported by Thomas Chauchefoin, and at this time, it affects all versions of WordPress. However, probable exploitation of this vulnerability is very low, and to fully protect yourself, all you’ll need to do is turn off XML-RPC or pingbacks on your WordPress site.
WordPress Plugin Vulnerabilities
In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, the severity rating, and the CVE.
Table of Contents Plus

Download Manager

Smash Balloon Social Post Feed

Mesmerize Companion
Starter Templates by Kadence WP

Slimstat Analytics

WPtouch

Royal Elementor Addons

Permalink Manager Lite

WOOCS

WP Recipe Maker

Metricool

WP Custom Admin Interface

Jetpack CRM

Image Hover Effects Ultimate

Multi Step Form

ActiveCampaign for WooCommerce
Vision Interactive For WordPress

Sunshine Photo Cart

Post Status Notifier Lite

WordPress Events Calendar Plugin

WPQA
Mautic Integration For WooCommerce
iPages Flipbook For WordPress
WordPress Plugin Vulnerabilities – No Known Fix
This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.
Mega Addons For WPBakery Page Builder

iPanorama 360 WordPress Virtual Tour Builder

ImageLinks Interactive Image Builder for WordPress

WP CSV
WP Table Reloaded
Bg Bible References
404 to Start
WordPress Theme Vulnerabilities
In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, the severity rating, and the CVE.

