Watch Out Wednesday – March 16, 2022

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress

Vulnerability: Subscriber+ Arbitrary File Creation/Upload/Deletion
Patched Version: 5.2.3
Recommended Action: Update to version 5.2.3, or a newer patched version

Core: WordPress

Vulnerability: 5.9.1
Patched Version: 5.9.2
Recommended Action: Update to version 5.9.2, or a newer patched version

Plugin: User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor

Vulnerability: Admin+ Stored Cross-Site Scripting
Patched Version: 3.6.8
Recommended Action: Update to version 3.6.8, or a newer patched version

Plugin: Portfolio, Gallery, Product Catalog – Grid KIT Portfolio

Vulnerability: Subscriber+ Stored Cross-Site Scripting
Patched Version: 2.1.0
Recommended Action: Update to version 2.1.0, or a newer patched version

Plugin: Booking for Appointments and Events Calendar – Amelia

Vulnerability: Arbitrary Booking Update and Sensitive Data Exposure
Patched Version: 1.0.49
Recommended Action: Update to version 1.0.49, or a newer patched version

Plugin: WooCommerce

Vulnerability: Unauthorized Order Status Change
Patched Version: 3.5.10
Recommended Action: Update to one of the following versions, or a newer patched version: 3.5.10, 3.6.7, 3.7.3, 3.8.3, 3.9.5, 4.0.4, 4.1.4, 4.2.5, 4.3.6, 4.4.4, 4.5.5, 4.6.5, 4.7.4, 4.8.3, 4.9.5, 5.0.3, 5.1.3, 5.2.5, 5.3.3, 5.4.4, 5.5.4, 5.6.2, 5.7.2, 5.8.1, 5.9.1, 6.0.1, 6.1.2, 6.2.2, 6.3.1

Plugin: Mark Posts

Vulnerability: Admin+ Stored Cross-Site Scripting
Patched Version: 2.0.1
Recommended Action: Update to version 2.0.1, or a newer patched version

Plugin: Social Share, Social Login and Social Comments Plugin – Super Socializer

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 7.13.30
Recommended Action: Update to version 7.13.30, or a newer patched version

Plugin: MapPress Maps for WordPress

Vulnerability: Admin+ File Upload to Remote Code Execution
Patched Version: 2.73.13
Recommended Action: Update to version 2.73.13, or a newer patched version

Plugin: Social Sharing Plugin – Sassy Social Share

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.3.40
Recommended Action: Update to version 3.3.40, or a newer patched version

Plugin: Post Grid and Gutenberg Blocks – ComboBlocks

Vulnerability: Cross-Site Scripting
Patched Version: 2.1.16
Recommended Action: Update to version 2.1.16, or a newer patched version

Plugin: Post Grid and Gutenberg Blocks – ComboBlocks

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.1.16
Recommended Action: Update to version 2.1.16, or a newer patched version

Plugin: Dropdown Menu Widget

Vulnerability: Cross-Site Request Forgery to Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Booking Package

Vulnerability: Unauthenticated Sensitive Data Disclosure
Patched Version: 1.5.29
Recommended Action: Update to version 1.5.29, or a newer patched version

Core: WordPress

Vulnerability: Prototype Pollution via Block Editor
Patched Version: 3.7.38
Recommended Action: Update to one of the following versions, or a newer patched version: 3.7.38, 3.8.38, 3.9.36, 4.0.35, 4.1.35, 4.2.32, 4.3.28, 4.4.27, 4.5.26, 4.6.23, 4.7.23, 4.8.19, 4.9.20, 5.0.16, 5.1.13, 5.2.15, 5.3.12, 5.4.10, 5.5.9, 5.6.8, 5.7.6, 5.8.4, 5.9.2

Plugin: Material Design for Contact Form 7

Vulnerability: Missing Authorization to Arbitrary Settings Update
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: NS WooCommerce Watermark

Vulnerability: Abuse of Functionality
Patched Version: 3.0.0
Recommended Action: Update to version 3.0.0, or a newer patched version

Plugin: Booking for Appointments and Events Calendar – Amelia

Vulnerability: Information Disclosure and SMS Spam
Patched Version: 1.0.48
Recommended Action: Update to version 1.0.48, or a newer patched version

Plugin: Members List Plugin

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 4.3.7
Recommended Action: Update to version 4.3.7, or a newer patched version

Core: WordPress

Vulnerability: jQuery Prototype Pollution
Patched Version: 3.7.38
Recommended Action: Update to one of the following versions, or a newer patched version: 3.7.38, 3.8.38, 3.9.36, 4.0.35, 4.1.35, 4.2.32, 4.3.28, 4.4.27, 4.5.26, 4.6.23, 4.7.23, 4.8.19, 4.9.20, 5.0.16, 5.1.13, 5.2.15, 5.3.12, 5.4.10, 5.5.9, 5.6.8, 5.7.6, 5.8.4, 5.9.2

Plugin: Page Builder: KingComposer – Free Drag and Drop page builder by King-Theme

Vulnerability: Authenticated Arbitrary Profile Creation and Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress