Watch Out Wednesday – November 30, 2022

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Better Click To Tweet

Vulnerability: Cross-Site Request Forgery
Patched Version: 5.10.4
Recommended Action: Update to version 5.10.4, or a newer patched version

Plugin: Contact Form, Survey, Quiz & Popup Form Builder – ARForms

Vulnerability: Unauthenticated Cross-Site Scripting
Patched Version: 1.5.7
Recommended Action: Update to version 1.5.7, or a newer patched version

Plugin: Download Manager

Vulnerability: Refleced Cross-Site Scripting
Patched Version: 3.2.60
Recommended Action: Update to version 3.2.60, or a newer patched version

Plugin: Organization chart

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.4.2
Recommended Action: Update to version 1.4.2, or a newer patched version

Plugin: Community Events

Vulnerability: Authenticated (Administrator+) Stored Cross Site Scripting
Patched Version: 1.4.9
Recommended Action: Update to version 1.4.9, or a newer patched version

Plugin: Simple:Press Forum

Vulnerability: Authenticated (Admin+) Path Traversal to Arbitrary File Modification
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version

Plugin: Popup Manager

Vulnerability: Missing Authorization to Arbitrary Popup Deletion
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Content Repeater – Custom Posts Simplified

Vulnerability: Authenticated (Admin+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction

Vulnerability: Missing Authorization to Arbitrary User Deletion
Patched Version: 3.8.1.3
Recommended Action: Update to version 3.8.1.3, or a newer patched version

Plugin: InPost Gallery

Vulnerability: Local File Inclusion
Patched Version: 2.1.4.1
Recommended Action: Update to version 2.1.4.1, or a newer patched version

Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

Vulnerability: Authenticated (Author+) SQL Injection via option_id
Patched Version: 19.1.5
Recommended Action: Update to version 19.1.5, or a newer patched version

Plugin: Paytm Payment Gateway

Vulnerability: Unauthenticated Server-Side Request Forgery
Patched Version: 2.7.3
Recommended Action: Update to version 2.7.3, or a newer patched version

Plugin: WHA Puzzle

Vulnerability: Authenticated (Contributor+) Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features

Vulnerability: Arbitrary File Upload
Patched Version: 4.0.9
Recommended Action: Update to version 4.0.9, or a newer patched version

Plugin: Welcart e-Commerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.8.4
Recommended Action: Update to version 2.8.4, or a newer patched version

Plugin: WP ULike – All-in-One Engagement Toolkit

Vulnerability: Race Condition
Patched Version: 4.6.5
Recommended Action: Update to version 4.6.5, or a newer patched version

Plugin: JoomSport – for Sports: Team & League, Football, Hockey & more

Vulnerability: Unauthenticated SQL Injection
Patched Version: 5.2.8
Recommended Action: Update to version 5.2.8, or a newer patched version

Plugin: Simple:Press Forum

Vulnerability: Authenticated (Subscriber+) Path Traversal to Arbitrary File Deletion
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version

Plugin: WP CSV Exporter

Vulnerability: CSV Injection
Patched Version: 1.3.7
Recommended Action: Update to version 1.3.7, or a newer patched version

Plugin: Simple:Press Forum

Vulnerability: Unauthenticated Stored Cross-Site Scripting via Forum Replies
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version

Plugin: ShareThis Dashboard for Google Analytics

Vulnerability: Missing Authorization
Patched Version: 3.1.5
Recommended Action: Update to version 3.1.5, or a newer patched version

Plugin: Wholesale Market for WooCommerce

Vulnerability: Authenticated (Administrator+) Arbitrary File Download
Patched Version: 1.0.8
Recommended Action: Update to version 1.0.8, or a newer patched version

Plugin: Simple:Press Forum

Vulnerability: Reflected Cross-Site Scripting via Cookie Value
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version

Plugin: Photo Gallery by 10Web – Mobile-Friendly Image Gallery

Vulnerability: Open Redirect
Patched Version: 1.8.8
Recommended Action: Update to version 1.8.8, or a newer patched version

Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

Vulnerability: Authenticated (Author+) SQL Injection via cg_activate and cg_deactivate
Patched Version: 19.1.5
Recommended Action: Update to version 19.1.5, or a newer patched version

Plugin: Uncanny Toolkit for LearnDash

Vulnerability: Cross-Site Request Forgery
Patched Version: 3.6.4
Recommended Action: Update to version 3.6.4, or a newer patched version

Plugin: Defender Security – Malware Scanner, Login Security & Firewall

Vulnerability: Sensitive Information Disclosure
Patched Version: 3.3.3
Recommended Action: Update to version 3.3.3, or a newer patched version

Plugin: FlyingPress

Vulnerability: Missing Authorization
Patched Version: 3.9.7
Recommended Action: Update to version 3.9.7, or a newer patched version

Plugin: Menu Item Visibility Control

Vulnerability: Authenticated (Admin+) Remote Code Execution
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: WP-FormAssembly

Vulnerability: Authenticated (Contributor+) Arbitrary File Read
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version

Plugin: Super Progressive Web Apps

Vulnerability: Missing Authorization
Patched Version: 2.2.9
Recommended Action: Update to version 2.2.9, or a newer patched version

Plugin: WP Shamsi – افزونه تاریخ شمسی و فارسی ساز وردپرس

Vulnerability: Missing Authorization to Arbitrary Plugin Deactivation
Patched Version: 4.1.1
Recommended Action: Update to version 4.1.1, or a newer patched version

Plugin: Age Gate

Vulnerability: Open Redirect
Patched Version: 2.13.5
Recommended Action: Update to version 2.13.5, or a newer patched version

Plugin: Authenticator

Vulnerability: Missing Authorization
Patched Version: 1.3.1
Recommended Action: Update to version 1.3.1, or a newer patched version

Plugin: Photo Gallery by 10Web – Mobile-Friendly Image Gallery

Vulnerability: Cross-Site Request Forgery to Stored Cross-Site Scripting
Patched Version: 1.8.3
Recommended Action: Update to version 1.8.3, or a newer patched version

Plugin: Kenta Blocks – Responsive Blocks and block templates library

Vulnerability: Missing Authorization
Patched Version: 1.1.0
Recommended Action: Update to version 1.1.0, or a newer patched version

Plugin: Image Map Pro – Drag-and-drop Builder for Interactive Images

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Social Sharing Plugin – Sassy Social Share

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.3.4
Recommended Action: Update to version 3.3.4, or a newer patched version

Plugin: Appointment Hour Booking – WordPress Booking Plugin

Vulnerability: Unauthenticated iFrame Injection via Appointment Form
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version

Plugin: Image Map Pro – Drag-and-drop Builder for Interactive Images

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Wholesale Market for WooCommerce

Vulnerability: Unauthenticated Arbitrary File Download
Patched Version: 1.0.7
Recommended Action: Update to version 1.0.7, or a newer patched version

Plugin: Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More

Vulnerability: Authenticated (Subscriber+) Cross-Site Scripting
Patched Version: 2.1.5.1
Recommended Action: Update to version 2.1.5.1, or a newer patched version

Plugin: Theme and plugin translation for Polylang (TTfP)

Vulnerability: Missing Authorization
Patched Version: 3.2.17
Recommended Action: Update to version 3.2.17, or a newer patched version

Plugin: Google Authenticator – WordPress 2FA, OTP SMS and Email

Vulnerability: Sensitive Data Exposure of Multifactor Backup Codes
Patched Version: 5.6.2
Recommended Action: Update to version 5.6.2, or a newer patched version

Plugin: Download Monitor

Vulnerability: Missing Authorization to Unauthenticated Data Export
Patched Version: 4.7.52
Recommended Action: Update to version 4.7.52, or a newer patched version

Plugin: Smart Slider 3

Vulnerability: Authenticated (Contributor+) PHP Object Injection
Patched Version: 3.5.1.11
Recommended Action: Update to version 3.5.1.11, or a newer patched version

Plugin: Appointment Hour Booking – WordPress Booking Plugin

Vulnerability: CSV Injection
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version

Plugin: Popup Manager

Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

Vulnerability: Unauthenticated iFrame Injection via Paragraph and Short Answer
Patched Version: 8.0.5
Recommended Action: Update to version 8.0.5, or a newer patched version

Plugin: Smart Slider 3

Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: 3.5.1.11
Recommended Action: Update to version 3.5.1.11, or a newer patched version

Plugin: External Media

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.0.36
Recommended Action: Update to version 1.0.36, or a newer patched version

Plugin: Quizlord

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Better Click To Tweet

Vulnerability: Missing Authorization
Patched Version: 5.10.4
Recommended Action: Update to version 5.10.4, or a newer patched version

Plugin: Organization chart

Vulnerability: Missing Authorization
Patched Version: 1.4.2
Recommended Action: Update to version 1.4.2, or a newer patched version

Plugin: Directorist: AI-Powered WordPress Business Directory Plugin with Classified Ads Listings

Vulnerability: Authenticated (Subscriber+) Sensitive Information Disclosure
Patched Version: 7.4.4
Recommended Action: Update to version 7.4.4, or a newer patched version

Plugin: wpForo Forum

Vulnerability: Insecure Direct Object Reference to Forum Privacy Change
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version

Plugin: Simple:Press Forum

Vulnerability: Authenticated (Subscriber+) Stored Cross-Site Scripting via Profile Signatures
Patched Version: 6.8.1
Recommended Action: Update to version 6.8.1, or a newer patched version

Plugin: WP Clictracker

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons

Vulnerability: Cross-Site Scripting
Patched Version: 14.0.0
Recommended Action: Update to version 14.0.0, or a newer patched version

Plugin: Appointment Hour Booking – WordPress Booking Plugin

Vulnerability: CAPTCHA Bypass
Patched Version: 1.3.73
Recommended Action: Update to version 1.3.73, or a newer patched version

Plugin: JobBoardWP – Job Board Listings and Submissions

Vulnerability: Unauthenticated Arbitrary File Upload
Patched Version: 1.2.2
Recommended Action: Update to version 1.2.2, or a newer patched version

Plugin: Content Repeater – Custom Posts Simplified

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress