Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Premium Courses & eLearning with Paid Memberships Pro for LearnDash, LifterLMS, Sensei LMS & TutorLMS
Vulnerability: Courses for Membership Add On <= 1.2.3
Patched Version: 1.2.4
Recommended Action: Update to version 1.2.4, or a newer patched version
Plugin: AI ChatBot for WordPress – WPBot
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting in Language Settings
Patched Version: 4.7.8
Recommended Action: Update to version 4.7.8, or a newer patched version
Plugin: Simple Ticker
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Patched Version: 3.06
Recommended Action: Update to version 3.06, or a newer patched version
Plugin: Upload Media By URL
Vulnerability: Cross-Site Request Forgery via ‘umbu_download’
Patched Version: 1.0.8
Recommended Action: Update to version 1.0.8, or a newer patched version
Plugin: AI ChatBot for WordPress – WPBot
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting in FAQ Builder
Patched Version: 4.7.8
Recommended Action: Update to version 4.7.8, or a newer patched version
Plugin: JCH Optimize
Vulnerability: Missing Authorization to Authenticated (Subscriber+) Settings Modification
Patched Version: 4.0.1
Recommended Action: Update to version 4.0.1, or a newer patched version
Plugin: Photo Gallery by Ays – Responsive Image Gallery
Vulnerability: Cross-Site Request Forgery
Patched Version: 5.2.7
Recommended Action: Update to version 5.2.7, or a newer patched version
Plugin: All Users Messenger
Vulnerability: Authenticated (Subscriber+) Insecure Direct Object Reference to Message Deletion
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Simple Blog Card
Vulnerability: Sensitive Information Exposure
Patched Version: 1.32
Recommended Action: Update to version 1.32, or a newer patched version
Plugin: User Activity Tracking and Log
Vulnerability: Cross-Site Request Forgery
Patched Version: 4.0.9
Recommended Action: Update to version 4.0.9, or a newer patched version
Plugin: Premium Courses & eLearning with Paid Memberships Pro for LearnDash, LifterLMS, Sensei LMS & TutorLMS
Vulnerability: Courses for Membership Add On <= 1.2.4
Patched Version: 1.2.5
Recommended Action: Update to version 1.2.5, or a newer patched version
Plugin: Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX
Vulnerability: Gutenberg Post Grid Blocks <= 3.0.5
Patched Version: 3.0.6
Recommended Action: Update to version 3.0.6, or a newer patched version
Plugin: Import Export Suite for CSV and XML Datafeed
Vulnerability: Arbitrary Usermeta Update to Authenticated (Author+) Privilege Escalation
Patched Version: 7.9.9
Recommended Action: Update to version 7.9.9, or a newer patched version
Plugin: Import Export Suite for CSV and XML Datafeed
Vulnerability: Sensitive Information Exposure via Directory Listing
Patched Version: 7.9.9
Recommended Action: Update to version 7.9.9, or a newer patched version
Plugin: Woo Custom Emails
Vulnerability: Reflected Cross-Site Scripting via wcemails_edit
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: JetElements
Vulnerability: Authenticated (Contributor+) Remote Code Execution
Patched Version: 2.6.11
Recommended Action: Update to version 2.6.11, or a newer patched version
Plugin: User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
Vulnerability: Missing Authorization to Initial Page Creation
Patched Version: 3.9.8
Recommended Action: Update to version 3.9.8, or a newer patched version
Plugin: The Post Grid – Shortcode, Gutenberg Blocks and Elementor Addon for Post Grid
Vulnerability: Cross-Site Request Forgery
Patched Version: 7.2.8
Recommended Action: Update to version 7.2.8, or a newer patched version
Plugin: POEditor
Vulnerability: Cross-Site Request Forgery
Patched Version: 0.9.8
Recommended Action: Update to version 0.9.8, or a newer patched version
Plugin: User Access Manager
Vulnerability: IP Spoofing
Patched Version: 2.2.18
Recommended Action: Update to version 2.2.18, or a newer patched version
Plugin: GDPR Cookie Compliance – Cookie Banner, Cookie Consent, Cookie Notice – CCPA, DSGVO, RGPD
Vulnerability: Cross-Site Request Forgery to License Modification
Patched Version: 4.12.5
Recommended Action: Update to version 4.12.5, or a newer patched version
Plugin: Order Delivery Date for WooCommerce
Vulnerability: Reflected Cross-Site Scripting via ‘orddd_lite_custom_startdate’ and ‘orddd_lite_custom_enddate’
Patched Version: 3.20.1
Recommended Action: Update to version 3.20.1, or a newer patched version
Plugin: FULL – Cliente
Vulnerability: Customer <= 2.2.3
Patched Version: 2.3
Recommended Action: Update to version 2.3, or a newer patched version
Plugin: Sign-up Sheets
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.2.9
Recommended Action: Update to version 2.2.9, or a newer patched version
Plugin: Subscribers Text Counter
Vulnerability: Cross-Site Request Forgery to Settings Update and Cross-Site Scripting
Patched Version: 1.7.1
Recommended Action: Update to version 1.7.1, or a newer patched version
Plugin: FULL – Cliente
Vulnerability: Customer <= 2.2.3
Patched Version: 2.3
Recommended Action: Update to version 2.3, or a newer patched version
Plugin: Duplicate Post
Vulnerability: Cross-Site Request Forgery via ‘cdp_action_handling’ AJAX action
Patched Version: 1.4.2
Recommended Action: Update to version 1.4.2, or a newer patched version
Plugin: Biometric Login For WooCommerce
Vulnerability: Unauthenticated Privilege Escalation
Patched Version: 1.0.4
Recommended Action: Update to version 1.0.4, or a newer patched version
Plugin: Premium Courses & eLearning with Paid Memberships Pro for LearnDash, LifterLMS, Sensei LMS & TutorLMS
Vulnerability: Courses for Membership Add On <= 1.2.3
Patched Version: 1.2.4
Recommended Action: Update to version 1.2.4, or a newer patched version
Plugin: Import Export Suite for CSV and XML Datafeed
Vulnerability: Authenticated (Author+) PHP File Creation to Remote Code Execution
Patched Version: 7.9.9
Recommended Action: Update to version 7.9.9, or a newer patched version
Plugin: User Activity Log
Vulnerability: Unauthenticated Data Export to Sensitive Information Disclosure
Patched Version: 1.6.6
Recommended Action: Update to version 1.6.6, or a newer patched version
Plugin: FormCraft – Form Builder
Vulnerability: Authenticated (Admin+) Stored Cross-Site Scripting
Patched Version: 1.2.7
Recommended Action: Update to version 1.2.7, or a newer patched version
Plugin: Leyka
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.30.3
Recommended Action: Update to version 3.30.3, or a newer patched version
Plugin: Ninja Forms – The Contact Form Builder That Grows With You
Vulnerability: Authenticated (Administrator+) Stored HTML Injection
Patched Version: 3.6.26
Recommended Action: Update to version 3.6.26, or a newer patched version
Plugin: Booking Package
Vulnerability: Reflected Cross-Site Scripting via ‘mode’
Patched Version: 1.6.02
Recommended Action: Update to version 1.6.02, or a newer patched version
Plugin: Real Estate Manager – Property Listing and Agent Management
Vulnerability: Arbitrary Usermeta Update to Authenticated (Subscriber+) Privilege Escalation
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Import Export Suite for CSV and XML Datafeed
Vulnerability: Authenticated (Author+) Remote Code Execution
Patched Version: 7.9.9
Recommended Action: Update to version 7.9.9, or a newer patched version
Plugin: Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 4.4.7
Recommended Action: Update to version 4.4.7, or a newer patched version
Plugin: Simple Share Follow Button
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Patched Version: 1.04
Recommended Action: Update to version 1.04, or a newer patched version
Plugin: Themesflat Addons For Elementor
Vulnerability: Unauthenticated PHP Object Injection
Patched Version: 2.0.1
Recommended Action: Update to version 2.0.1, or a newer patched version
Plugin: Advanced Custom Fields (ACF)
Vulnerability: 6.1.7
Patched Version: 6.1.8
Recommended Action: Update to version 6.1.8, or a newer patched version
Plugin: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.6.9
Recommended Action: Update to version 2.6.9, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.