Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: WP GDPR
Vulnerability: Missing Authorization Checks
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Quick Page/Post Redirect Plugin
Vulnerability: Redirect Security Bypass
Patched Version: 5.2.0
Recommended Action: Update to version 5.2.0, or a newer patched version
Plugin: Gmedia Photo Gallery
Vulnerability: Cross-Site Scripting
Patched Version: 1.18.5
Recommended Action: Update to version 1.18.5, or a newer patched version
Plugin: WordPress WP-Advanced-Search
Vulnerability: SQL Injection
Patched Version: 3.3.7
Recommended Action: Update to version 3.3.7, or a newer patched version
Plugin: YOP Poll
Vulnerability: Authenticated Stored Cross-Site Scripting
Patched Version: 6.1.5
Recommended Action: Update to version 6.1.5, or a newer patched version
Plugin: Duplicate Page and Post
Vulnerability: SQL Injection
Patched Version: 2.5.7
Recommended Action: Update to version 2.5.7, or a newer patched version
Plugin: Advanced Woo Search
Vulnerability: Information Disclosure
Patched Version: 2.00
Recommended Action: Update to version 2.00, or a newer patched version
Plugin: Catch Breadcrumb
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.5.5
Recommended Action: Update to version 1.5.5, or a newer patched version
Plugin: Ninja Forms – The Contact Form Builder That Grows With You
Vulnerability: Cross-Site Request Forgery leading to Stored Cross-Site Scripting
Patched Version: 3.4.24.2
Recommended Action: Update to version 3.4.24.2, or a newer patched version
Plugin: Real-Time Find and Replace
Vulnerability: Cross-Site Request Forgery to Stored Cross-Site Scripting
Patched Version: 4.0.2
Recommended Action: Update to version 4.0.2, or a newer patched version
Plugin: WP GDPR
Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.