Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Better Click To Tweet
Vulnerability: Cross-Site Request Forgery
Patched Version: 5.10.4
Recommended Action: Update to version 5.10.4, or a newer patched version
Plugin: Contact Form, Survey, Quiz & Popup Form Builder – ARForms
Vulnerability: Unauthenticated Cross-Site Scripting
Patched Version: 1.5.7
Recommended Action: Update to version 1.5.7, or a newer patched version
Plugin: Download Manager
Vulnerability: Refleced Cross-Site Scripting
Patched Version: 3.2.60
Recommended Action: Update to version 3.2.60, or a newer patched version
Plugin: Organization chart
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.4.2
Recommended Action: Update to version 1.4.2, or a newer patched version
Plugin: Community Events
Vulnerability: Authenticated (Administrator+) Stored Cross Site Scripting
Patched Version: 1.4.9
Recommended Action: Update to version 1.4.9, or a newer patched version
Plugin: Simple:Press Forum
Vulnerability: Authenticated (Admin+) Path Traversal to Arbitrary File Modification
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version
Plugin: Popup Manager
Vulnerability: Missing Authorization to Arbitrary Popup Deletion
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Content Repeater – Custom Posts Simplified
Vulnerability: Authenticated (Admin+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction
Vulnerability: Missing Authorization to Arbitrary User Deletion
Patched Version: 3.8.1.3
Recommended Action: Update to version 3.8.1.3, or a newer patched version
Plugin: InPost Gallery
Vulnerability: Local File Inclusion
Patched Version: 2.1.4.1
Recommended Action: Update to version 2.1.4.1, or a newer patched version
Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons
Vulnerability: Authenticated (Author+) SQL Injection via option_id
Patched Version: 19.1.5
Recommended Action: Update to version 19.1.5, or a newer patched version
Plugin: Paytm Payment Gateway
Vulnerability: Unauthenticated Server-Side Request Forgery
Patched Version: 2.7.3
Recommended Action: Update to version 2.7.3, or a newer patched version
Plugin: WHA Puzzle
Vulnerability: Authenticated (Contributor+) Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features
Vulnerability: Arbitrary File Upload
Patched Version: 4.0.9
Recommended Action: Update to version 4.0.9, or a newer patched version
Plugin: Welcart e-Commerce
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.8.4
Recommended Action: Update to version 2.8.4, or a newer patched version
Plugin: WP ULike – All-in-One Engagement Toolkit
Vulnerability: Race Condition
Patched Version: 4.6.5
Recommended Action: Update to version 4.6.5, or a newer patched version
Plugin: JoomSport – for Sports: Team & League, Football, Hockey & more
Vulnerability: Unauthenticated SQL Injection
Patched Version: 5.2.8
Recommended Action: Update to version 5.2.8, or a newer patched version
Plugin: Simple:Press Forum
Vulnerability: Authenticated (Subscriber+) Path Traversal to Arbitrary File Deletion
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version
Plugin: WP CSV Exporter
Vulnerability: CSV Injection
Patched Version: 1.3.7
Recommended Action: Update to version 1.3.7, or a newer patched version
Plugin: Simple:Press Forum
Vulnerability: Unauthenticated Stored Cross-Site Scripting via Forum Replies
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version
Plugin: ShareThis Dashboard for Google Analytics
Vulnerability: Missing Authorization
Patched Version: 3.1.5
Recommended Action: Update to version 3.1.5, or a newer patched version
Plugin: Wholesale Market for WooCommerce
Vulnerability: Authenticated (Administrator+) Arbitrary File Download
Patched Version: 1.0.8
Recommended Action: Update to version 1.0.8, or a newer patched version
Plugin: Simple:Press Forum
Vulnerability: Reflected Cross-Site Scripting via Cookie Value
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version
Plugin: Photo Gallery by 10Web – Mobile-Friendly Image Gallery
Vulnerability: Open Redirect
Patched Version: 1.8.8
Recommended Action: Update to version 1.8.8, or a newer patched version
Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons
Vulnerability: Authenticated (Author+) SQL Injection via cg_activate and cg_deactivate
Patched Version: 19.1.5
Recommended Action: Update to version 19.1.5, or a newer patched version
Plugin: Uncanny Toolkit for LearnDash
Vulnerability: Cross-Site Request Forgery
Patched Version: 3.6.4
Recommended Action: Update to version 3.6.4, or a newer patched version
Plugin: Defender Security – Malware Scanner, Login Security & Firewall
Vulnerability: Sensitive Information Disclosure
Patched Version: 3.3.3
Recommended Action: Update to version 3.3.3, or a newer patched version
Plugin: FlyingPress
Vulnerability: Missing Authorization
Patched Version: 3.9.7
Recommended Action: Update to version 3.9.7, or a newer patched version
Plugin: Menu Item Visibility Control
Vulnerability: Authenticated (Admin+) Remote Code Execution
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: WP-FormAssembly
Vulnerability: Authenticated (Contributor+) Arbitrary File Read
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version
Plugin: Super Progressive Web Apps
Vulnerability: Missing Authorization
Patched Version: 2.2.9
Recommended Action: Update to version 2.2.9, or a newer patched version
Plugin: WP Shamsi – افزونه تاریخ شمسی و فارسی ساز وردپرس
Vulnerability: Missing Authorization to Arbitrary Plugin Deactivation
Patched Version: 4.1.1
Recommended Action: Update to version 4.1.1, or a newer patched version
Plugin: Age Gate
Vulnerability: Open Redirect
Patched Version: 2.13.5
Recommended Action: Update to version 2.13.5, or a newer patched version
Plugin: Authenticator
Vulnerability: Missing Authorization
Patched Version: 1.3.1
Recommended Action: Update to version 1.3.1, or a newer patched version
Plugin: Photo Gallery by 10Web – Mobile-Friendly Image Gallery
Vulnerability: Cross-Site Request Forgery to Stored Cross-Site Scripting
Patched Version: 1.8.3
Recommended Action: Update to version 1.8.3, or a newer patched version
Plugin: Kenta Blocks – Responsive Blocks and block templates library
Vulnerability: Missing Authorization
Patched Version: 1.1.0
Recommended Action: Update to version 1.1.0, or a newer patched version
Plugin: Image Map Pro – Drag-and-drop Builder for Interactive Images
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Social Sharing Plugin – Sassy Social Share
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.3.4
Recommended Action: Update to version 3.3.4, or a newer patched version
Plugin: Appointment Hour Booking – WordPress Booking Plugin
Vulnerability: Unauthenticated iFrame Injection via Appointment Form
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version
Plugin: Image Map Pro – Drag-and-drop Builder for Interactive Images
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Wholesale Market for WooCommerce
Vulnerability: Unauthenticated Arbitrary File Download
Patched Version: 1.0.7
Recommended Action: Update to version 1.0.7, or a newer patched version
Plugin: Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More
Vulnerability: Authenticated (Subscriber+) Cross-Site Scripting
Patched Version: 2.1.5.1
Recommended Action: Update to version 2.1.5.1, or a newer patched version
Plugin: Theme and plugin translation for Polylang (TTfP)
Vulnerability: Missing Authorization
Patched Version: 3.2.17
Recommended Action: Update to version 3.2.17, or a newer patched version
Plugin: Google Authenticator – WordPress 2FA, OTP SMS and Email
Vulnerability: Sensitive Data Exposure of Multifactor Backup Codes
Patched Version: 5.6.2
Recommended Action: Update to version 5.6.2, or a newer patched version
Plugin: Download Monitor
Vulnerability: Missing Authorization to Unauthenticated Data Export
Patched Version: 4.7.52
Recommended Action: Update to version 4.7.52, or a newer patched version
Plugin: Smart Slider 3
Vulnerability: Authenticated (Contributor+) PHP Object Injection
Patched Version: 3.5.1.11
Recommended Action: Update to version 3.5.1.11, or a newer patched version
Plugin: Appointment Hour Booking – WordPress Booking Plugin
Vulnerability: CSV Injection
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version
Plugin: Popup Manager
Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
Vulnerability: Unauthenticated iFrame Injection via Paragraph and Short Answer
Patched Version: 8.0.5
Recommended Action: Update to version 8.0.5, or a newer patched version
Plugin: Smart Slider 3
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: 3.5.1.11
Recommended Action: Update to version 3.5.1.11, or a newer patched version
Plugin: External Media
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.0.36
Recommended Action: Update to version 1.0.36, or a newer patched version
Plugin: Quizlord
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Better Click To Tweet
Vulnerability: Missing Authorization
Patched Version: 5.10.4
Recommended Action: Update to version 5.10.4, or a newer patched version
Plugin: Organization chart
Vulnerability: Missing Authorization
Patched Version: 1.4.2
Recommended Action: Update to version 1.4.2, or a newer patched version
Plugin: Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings
Vulnerability: Authenticated (Subscriber+) Sensitive Information Disclosure
Patched Version: 7.4.4
Recommended Action: Update to version 7.4.4, or a newer patched version
Plugin: wpForo Forum
Vulnerability: Insecure Direct Object Reference to Forum Privacy Change
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version
Plugin: Simple:Press Forum
Vulnerability: Authenticated (Subscriber+) Stored Cross-Site Scripting via Profile Signatures
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version
Plugin: WP Clictracker
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons
Vulnerability: Cross-Site Scripting
Patched Version: 14.0.0
Recommended Action: Update to version 14.0.0, or a newer patched version
Plugin: Appointment Hour Booking – WordPress Booking Plugin
Vulnerability: CAPTCHA Bypass
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version
Plugin: JobBoardWP – Job Board Listings and Submissions
Vulnerability: Unauthenticated Arbitrary File Upload
Patched Version: 1.2.2
Recommended Action: Update to version 1.2.2, or a newer patched version
Plugin: Content Repeater – Custom Posts Simplified
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.