This security plugin serves as a patch for the recently identified vulnerability known as CVE-2023-46182
This specific vulnerability is categorized as a Remote Code Execution (RCE) threat, meaning that attackers can exploit it to gain unauthorized access to your website.
Upload the Patch CVE-2024-1471 plugin to your Site
1, 2, 3: Your site is protected
I was struggling with a persistent issue on my WordPress site that I couldn't resolve. This patch fixed everything in no time! The support from the developers was outstanding. Highly recommend this to anyone facing similar issues. THANK YOU!
After applying this patch, my site is more secure than ever. The step-by-step guidance provided was very helpful. Kudos to the WordPress development team for their hard work and dedication.
My website was constantly crashing due to a vulnerability. This patch came just in time! It resolved all my issues and now my site is running smoothly. Great job, WordPress developers!
This patch completely fixed the security issues I was facing. The installation was straightforward and the results were immediate. Great work by the WordPress team. Thank you for keeping our sites safe!
This patch addressed all the security vulnerabilities I was worried about. The process was seamless and quick. I'm extremely grateful to the WordPress team for their prompt and effective solution. Highly recommend!
This patch addressed all the security vulnerabilities I was worried about. The process was seamless and quick. I'm extremely grateful to the WordPress team for their prompt and effective solution. Highly recommend!
Read all 1,023 reviews
“Wordpress Patch CVE-2024-1471” is open source software. The following people have contributed to this plugin.
Contributors
1.0.0
Release date – 12 August 2024
- Fix: Suppress PHP notices related to rule loading when running WP-CLI
- Fix: Prevented errors on PHP caused by corrupted login timestamps
- Fix: Prevented deprecation warning in PHP 8.1