Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Digital Climate Strike WP
Vulnerability: Malicious Redirect
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: 123ContactForm for WordPress
Vulnerability: Arbitrary Post Creation
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Contact Form 7 Database Addon – CFDB7
Vulnerability: CSV Injection
Patched Version: 1.2.5.6
Recommended Action: Update to version 1.2.5.6, or a newer patched version
Plugin: 123ContactForm for WordPress
Vulnerability: Arbitrary File Upload
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Advanced Custom Fields Pro
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 5.9.1
Recommended Action: Update to version 5.9.1, or a newer patched version
Plugin: Under Construction
Vulnerability: Authenticated Stored Cross-Site Scripting
Patched Version: 3.86
Recommended Action: Update to version 3.86, or a newer patched version
Plugin: Doneren met Mollie
Vulnerability: Information Disclosure
Patched Version: 2.8.5
Recommended Action: Update to version 2.8.5, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.