Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Simple Membership
Vulnerability: Authenticated (Admin+) SQL Injections
Patched Version: 4.0.4
Recommended Action: Update to version 4.0.4, or a newer patched version
Plugin: WPBakery Page Builder Clipboard
Vulnerability: Stored Cross-Site Scripting
Patched Version: 4.5.6
Recommended Action: Update to version 4.5.6, or a newer patched version
Plugin: WPBakery Page Builder Clipboard
Vulnerability: Arbitrary License Options Update
Patched Version: 4.5.8
Recommended Action: Update to version 4.5.8, or a newer patched version
Plugin: Alkubot – Gamify discounts, sell more and give less at the right time
Vulnerability: Cross-Site Request Forgery
Patched Version: 3.0.0
Recommended Action: Update to version 3.0.0, or a newer patched version
Plugin: Tutor LMS – eLearning and online course solution
Vulnerability: Authenticated Local File Inclusion
Patched Version: 1.8.8
Recommended Action: Update to version 1.8.8, or a newer patched version
Plugin: Realteo
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.2.4
Recommended Action: Update to version 1.2.4, or a newer patched version
Plugin: Business Hours Pro WordPress Plugin
Vulnerability: Arbitrary File Upload
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.7.0.1
Recommended Action: Update to version 3.7.0.1, or a newer patched version
Plugin: Erident Custom Login and Dashboard
Vulnerability: Authenticated Stored Cross-Site Scripting
Patched Version: 3.5.9
Recommended Action: Update to version 3.5.9, or a newer patched version
Plugin: OneLogin SAML SSO
Vulnerability: Open Redirection
Patched Version: 3.2.0
Recommended Action: Update to version 3.2.0, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.