Watch Out Wednesday – January 13, 2021

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: e-signature

Vulnerability: Unauthenticated Remote Code Execution
Patched Version: 1.5.6.8
Recommended Action: Update to version 1.5.6.8, or a newer patched version

Plugin: Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions

Vulnerability: IDOR to Sensitive Information Disclosure
Patched Version: 2.5.3
Recommended Action: Update to version 2.5.3, or a newer patched version

Plugin: Tutor LMS – eLearning and online course solution

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.9.13
Recommended Action: Update to version 1.9.13, or a newer patched version

Plugin: Solid Security – Password, Two Factor Authentication, and Brute Force Protection

Vulnerability: Broken Password Mechanism
Patched Version: 7.7.0
Recommended Action: Update to version 7.7.0, or a newer patched version

Plugin: Five Star Restaurant Menu and Food Ordering

Vulnerability: Unauthenticated Arbitrary Object Deserialization leading to Remote Code Execution
Patched Version: 2.2.1
Recommended Action: Update to version 2.2.1, or a newer patched version

Plugin: WP Quick FrontEnd Editor – WordPress Plugin

Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Core: WordPress

Vulnerability: SQL Injection via WP_Query
Patched Version: 3.7.37
Recommended Action: Update to one of the following versions, or a newer patched version: 3.7.37, 3.8.37, 3.9.35, 4.0.34, 4.1.34, 4.2.31, 4.3.27, 4.4.26, 4.5.25, 4.6.22, 4.7.22, 4.8.18, 4.9.19, 5.0.15, 5.1.12, 5.2.14, 5.3.11, 5.4.9, 5.5.8, 5.6.7, 5.7.5, 5.8.3

Plugin: Orbit Fox by ThemeIsle

Vulnerability: Authenticated (Contributor+) Stored Cross Site Scripting
Patched Version: 2.10.3
Recommended Action: Update to version 2.10.3, or a newer patched version

Plugin: WP Quick FrontEnd Editor – WordPress Plugin

Vulnerability: Authenticated Settings Change
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Modal Survey – WordPress Poll, Survey & Quiz Plugin

Vulnerability: Authorization Bypass
Patched Version: 2.0.1.8.2
Recommended Action: Update to version 2.0.1.8.2, or a newer patched version

Plugin: WP24 Domain Check

Vulnerability: Cross-Site Scripting
Patched Version: 1.6.3
Recommended Action: Update to version 1.6.3, or a newer patched version

Plugin: Modal Survey – WordPress Poll, Survey & Quiz Plugin

Vulnerability: PHP Object Injection
Patched Version: 2.0.1.8.2
Recommended Action: Update to version 2.0.1.8.2, or a newer patched version

Plugin: Custom Global Variables

Vulnerability: Stored Cross-Site Scripting via ‘name’
Patched Version: 1.1.1
Recommended Action: Update to version 1.1.1, or a newer patched version

Plugin: WP Quick FrontEnd Editor – WordPress Plugin

Vulnerability: Authenticated (Subscriber+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: WP Quick FrontEnd Editor – WordPress Plugin

Vulnerability: Authenticated (Subscriber+) Content Injection
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress