Watch Out Wednesday – February 17, 2021

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Map Block for Google Maps

Vulnerability: Unprotected AJAX Action
Patched Version: 1.32
Recommended Action: Update to version 1.32, or a newer patched version

Plugin: Responsive Menu – Create Mobile-Friendly Menu

Vulnerability: Cross-Site Request Forgery to Setting Modification
Patched Version: 4.0.4
Recommended Action: Update to version 4.0.4, or a newer patched version

Plugin: Ninja Forms – The Contact Form Builder That Grows With You

Vulnerability: Administrator Open Redirect
Patched Version: 3.4.34
Recommended Action: Update to version 3.4.34, or a newer patched version

Plugin: Ninja Forms – The Contact Form Builder That Grows With You

Vulnerability: Authenticated SendWP Plugin Installation and Client Secret Key Disclosure
Patched Version: 3.4.34
Recommended Action: Update to version 3.4.34, or a newer patched version

Plugin: Responsive Menu – Create Mobile-Friendly Menu

Vulnerability: Cross-Site Request Forgery to Arbitrary File Upload
Patched Version: 4.0.4
Recommended Action: Update to version 4.0.4, or a newer patched version

Plugin: Ninja Forms – The Contact Form Builder That Grows With You

Vulnerability: Authenticated OAuth Connection Key Disclosure
Patched Version: 3.4.34.1
Recommended Action: Update to version 3.4.34.1, or a newer patched version

Plugin: Responsive Menu – Create Mobile-Friendly Menu

Vulnerability: 4.0.3
Patched Version: 4.0.4
Recommended Action: Update to version 4.0.4, or a newer patched version

Plugin: WP Inimat

Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Ninja Forms – The Contact Form Builder That Grows With You

Vulnerability: Cross-Site Request Forgery to OAuth Service Disconnection
Patched Version: 3.4.34
Recommended Action: Update to version 3.4.34, or a newer patched version

Plugin: Theme Editor

Vulnerability: Authenticated Arbitrary File Download
Patched Version: 2.6
Recommended Action: Update to version 2.6, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress