Watch Out Wednesday – August 2, 2023

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Booster for WooCommerce

Vulnerability: Authenticated (Shop Manager+) Missing Authorization to Arbitrary Options Update
Patched Version: 7.1.0
Recommended Action: Update to version 7.1.0, or a newer patched version

Plugin: WC Shop Sync – Square Payment Gateway for WooCommerce, Inventory Sync Between Square and WooCommerce, Ultimate WooCommerce Square Plugin

Vulnerability: Missing Authorization
Patched Version: 4.4.2
Recommended Action: Update to version 4.4.2, or a newer patched version

Plugin: wpShopGermany – Protected Shops

Vulnerability: Protected Shops <= 2.0
Patched Version: 2.1
Recommended Action: Update to version 2.1, or a newer patched version

Plugin: Banner Management For WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.4.3
Recommended Action: Update to version 2.4.3, or a newer patched version

Plugin: User Email Verification for WooCommerce

Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Discussion Board – WordPress Forum Plugin

Vulnerability: Authenticated (Subscriber+) Content Injection
Patched Version: 2.4.9
Recommended Action: Update to version 2.4.9, or a newer patched version

Plugin: wp tell a friend popup form

Vulnerability: Cross-Site Request Forgery via ‘TellAFriend_admin’
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Shop as a Customer for WooCommerce

Vulnerability: Authenticated (Shop Manager+) Privilege Escalation
Patched Version: 1.2.4
Recommended Action: Update to version 1.2.4, or a newer patched version

Plugin: Meks Audio Player

Vulnerability: Cross-Site Request Forgery via meks_remove_notification
Patched Version: 1.3
Recommended Action: Update to version 1.3, or a newer patched version

Plugin: Optimize Database after Deleting Revisions

Vulnerability: Cross-Site Request Forgery via ‘odb_start_manually’
Patched Version: 5.2
Recommended Action: Update to version 5.2, or a newer patched version

Plugin: Simple Wp Sitemap

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: HTTP Auth

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.0.0
Recommended Action: Update to version 1.0.0, or a newer patched version

Plugin: InstaWP Connect – 1-click WP Staging & Migration

Vulnerability: Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver
Patched Version: 0.0.9.19
Recommended Action: Update to version 0.0.9.19, or a newer patched version

Plugin: Stripe Payment Plugin for WooCommerce

Vulnerability: Authentication Bypass
Patched Version: 3.7.8
Recommended Action: Update to version 3.7.8, or a newer patched version

Plugin: MultiParcels Shipping For WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.15.2
Recommended Action: Update to version 1.15.2, or a newer patched version

Plugin: Optimize Database after Deleting Revisions

Vulnerability: Cross-Site Request Forgery via ‘odb_csv_download’
Patched Version: 5.1
Recommended Action: Update to version 5.1, or a newer patched version

Plugin: Media from FTP

Vulnerability: Improper Privilege Management
Patched Version: 11.16
Recommended Action: Update to version 11.16, or a newer patched version

Plugin: Schema Pro

Vulnerability: Authenticated(Contributor+) Missing Authorization
Patched Version: 2.7.9
Recommended Action: Update to version 2.7.9, or a newer patched version

Plugin: ACF Photo Gallery Field

Vulnerability: Authenticated (Subscriber+) Arbitrary Usermeta Update
Patched Version: 2.0
Recommended Action: Update to version 2.0, or a newer patched version

Plugin: Shop as a Customer for WooCommerce

Vulnerability: Authenticated (Subscriber+) Privilege Escalation
Patched Version: 1.1.8
Recommended Action: Update to version 1.1.8, or a newer patched version

Plugin: Church Admin

Vulnerability: Server-Side Request Forgery via church_admin_import_csv
Patched Version: 3.8.0
Recommended Action: Update to version 3.8.0, or a newer patched version

Plugin: Simple Blog Card

Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Patched Version: 1.31
Recommended Action: Update to version 1.31, or a newer patched version

Plugin: TI WooCommerce Wishlist

Vulnerability: Unauthenticated Blind SQL Injection via Rest API
Patched Version: 2.7.4
Recommended Action: Update to version 2.7.4, or a newer patched version

Plugin: MultiParcels Shipping For WooCommerce

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.15.4
Recommended Action: Update to version 1.15.4, or a newer patched version

Plugin: WordPress Job Board and Recruitment Plugin – JobWP

Vulnerability: Arbitrary File Upload via ‘jobwp_upload_resume’
Patched Version: 2.1
Recommended Action: Update to version 2.1, or a newer patched version

Plugin: All In One Login — WordPress Login Security Plugin to Protect and Customize WP Admin

Vulnerability: Protection Mechanism Failure to Login Page Disclosure
Patched Version: 1.1.4
Recommended Action: Update to version 1.1.4, or a newer patched version

Plugin: Assistant – Every Day Productivity Apps

Vulnerability: Authenticated (Editor+) Server Side Request Forgery
Patched Version: 1.4.4
Recommended Action: Update to version 1.4.4, or a newer patched version

Plugin: Web Accessibility By accessiBe

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.16
Recommended Action: Update to version 1.16, or a newer patched version

Plugin: Blog2Social: Social Media Auto Post & Scheduler

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 7.2.1
Recommended Action: Update to version 7.2.1, or a newer patched version

Plugin: SSL Mixed Content Fix

Vulnerability: Cross-Site Request Forgery on handle_installation function
Patched Version: 3.2.4
Recommended Action: Update to version 3.2.4, or a newer patched version

Plugin: AGP Font Awesome Collection

Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Slider Carousel – Image Slider

Vulnerability: Missing Authorization
Patched Version: 1.5.1
Recommended Action: Update to version 1.5.1, or a newer patched version

Plugin: Saphali Woocommerce Lite

Vulnerability: Cross-Site Request Forgery via ‘woocommerce_saphali_page_s_l’
Patched Version: 1.9.0
Recommended Action: Update to version 1.9.0, or a newer patched version

Plugin: SSL Mixed Content Fix

Vulnerability: Missing Authorization on handle_installation function
Patched Version: 3.2.4
Recommended Action: Update to version 3.2.4, or a newer patched version

Plugin: Author Box, Guest Author and Co-Authors for Your Posts – Molongui

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 4.6.20
Recommended Action: Update to version 4.6.20, or a newer patched version

Plugin: cartflows-pro

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.11.13
Recommended Action: Update to version 1.11.13, or a newer patched version

Plugin: Short URL

Vulnerability: Missing Authorization via multiple AJAX functions
Patched Version: 1.6.8
Recommended Action: Update to version 1.6.8, or a newer patched version

Plugin: Update Theme and Plugins from Zip File

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Meks Smart Social Widget

Vulnerability: Missing Authorization to notice dimissal
Patched Version: 1.6.1
Recommended Action: Update to version 1.6.1, or a newer patched version

Plugin: wp tell a friend popup form

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Fraud Prevention For WooCommerce and EDD

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.1.6
Recommended Action: Update to version 2.1.6, or a newer patched version

Plugin: Chat Widget: Customer Support Button with SMS Call Button, Click to Chat Messenger, Live Chat Support Chat Button – Bit Assist

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.1.9
Recommended Action: Update to version 1.1.9, or a newer patched version

Plugin: Bus Ticket Booking with Seat Reservation – WpBusTicketly | WordPress plugin

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 5.2.4
Recommended Action: Update to version 5.2.4, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress