Watch Out Wednesday – December 8, 2021

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty

Vulnerability: Chaty <= 2.8.2 Reflected Cross-Site Scripting
Patched Version: 2.8.3
Recommended Action: Update to version 2.8.3, or a newer patched version

Plugin: Use-Your-Drive

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.18.3
Recommended Action: Update to version 1.18.3, or a newer patched version

Plugin: Share-one-Drive

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.15.3
Recommended Action: Update to version 1.15.3, or a newer patched version

Plugin: UpdraftPlus: WP Backup & Migration Plugin

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.16.66
Recommended Action: Update to version 1.16.66, or a newer patched version

Plugin: Customize Login Image

Vulnerability: Cross-Site Scripting
Patched Version: 3.5
Recommended Action: Update to version 3.5, or a newer patched version

Plugin: PowerPack Elementor Addons (Free Widgets, Extensions and Templates)

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.6.2
Recommended Action: Update to version 2.6.2, or a newer patched version

Plugin: Modern Events Calendar Lite

Vulnerability: Subscriber+ Category Add Leading to Stored Cross-Site Scripting
Patched Version: 6.2.0
Recommended Action: Update to version 6.2.0, or a newer patched version

Plugin: Stars Rating

Vulnerability: Denial of Service
Patched Version: 3.5.1
Recommended Action: Update to version 3.5.1, or a newer patched version

Plugin: CAOS | Host Google Analytics Locally

Vulnerability: Admin+ Arbitrary Folder Deletion via Path Traversal
Patched Version: 4.1.9
Recommended Action: Update to version 4.1.9, or a newer patched version

Plugin: WPcalc – create any online calculators

Vulnerability: SQL Injection
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Site Reviews

Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: 5.17.3
Recommended Action: Update to version 5.17.3, or a newer patched version

Plugin: WP Coder – Code Snippets + HTML, CSS, JS and PHP Injection

Vulnerability: Remote File Inclusion leading to Remote Code Execution via Cross-Site Request Forgery
Patched Version: 2.5.2
Recommended Action: Update to version 2.5.2, or a newer patched version

Plugin: PDF Invoices & Packing Slips for WooCommerce

Vulnerability: Reflected Cross-Site Scripting via tab and section parameter
Patched Version: 2.10.5
Recommended Action: Update to version 2.10.5, or a newer patched version

Plugin: Booster for WooCommerce

Vulnerability: Reflected Cross-Site Scripting in Product XML Feeds Module
Patched Version: 5.4.9
Recommended Action: Update to version 5.4.9, or a newer patched version

Plugin: Advanced Custom Fields (ACF)

Vulnerability: Missing Authorization on Option Changes
Patched Version: 5.11
Recommended Action: Update to version 5.11, or a newer patched version

Plugin: Booster for WooCommerce

Vulnerability: Reflected Cross-Site Scripting in PDF Invoicing Module
Patched Version: 5.4.9
Recommended Action: Update to version 5.4.9, or a newer patched version

Plugin: WP Travel Engine – Tour Booking Plugin – Tour Operator Software

Vulnerability: Editor+ Stored Cross-Site Scripting
Patched Version: 5.3.1
Recommended Action: Update to version 5.3.1, or a newer patched version

Plugin: Survey Maker

Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: 2.0.7
Recommended Action: Update to version 2.0.7, or a newer patched version

Plugin: Modal Window – create popup modal window

Vulnerability: Cross-Site Request Forgery to Remote Code Execution
Patched Version: 5.2.2
Recommended Action: Update to version 5.2.2, or a newer patched version

Plugin: WP Booking Calendar

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 8.9.2
Recommended Action: Update to version 8.9.2, or a newer patched version

Plugin: Booster for WooCommerce

Vulnerability: Reflected Cross-Site Scripting in General Module
Patched Version: 5.4.9
Recommended Action: Update to version 5.4.9, or a newer patched version

Plugin: Advanced Custom Fields (ACF)

Vulnerability: Missing Authorization to Information Disclosure
Patched Version: 5.11
Recommended Action: Update to version 5.11, or a newer patched version

Plugin: 10WebSocial

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.4.29
Recommended Action: Update to version 1.4.29, or a newer patched version

Plugin: Post Duplicator

Vulnerability: Cross-Site Scripting
Patched Version: 2.24
Recommended Action: Update to version 2.24, or a newer patched version

Plugin: MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.8.4
Recommended Action: Update to version 3.8.4, or a newer patched version

Plugin: Variation Swatches for WooCommerce

Vulnerability: Authenticated (Subscriber+) Stored Cross-Site Scripting
Patched Version: 2.1.2
Recommended Action: Update to version 2.1.2, or a newer patched version

Plugin: Button Generator – easily Button Builder

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.3.3
Recommended Action: Update to version 2.3.3, or a newer patched version

Plugin: Events Made Easy

Vulnerability: Subscriber+ SQL Injection
Patched Version: 2.2.36
Recommended Action: Update to version 2.2.36, or a newer patched version

Plugin: Tab – Accordion, FAQ

Vulnerability: Unauthenticated Arbitrary Tab Modification
Patched Version: 1.3.2
Recommended Action: Update to version 1.3.2, or a newer patched version

Plugin: Advanced Custom Fields (ACF)

Vulnerability: Missing Authorization to Information Disclosure
Patched Version: 5.11
Recommended Action: Update to version 5.11, or a newer patched version

Plugin: OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy.

Vulnerability: Authenticated (Admin+) Arbitrary Folder Deletion via Path Traversal
Patched Version: 4.5.12
Recommended Action: Update to version 4.5.12, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress