Watch Out Wednesday – January 22, 2020

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: LearnDash LMS

Vulnerability: Reflected Cross Site Scripting issue on the [ld_profile] search field
Patched Version: 3.1.2
Recommended Action: Update to version 3.1.2, or a newer patched version

Plugin: Chatbot with IBM watsonx Assistant

Vulnerability: Cross-Site Scripting
Patched Version: 0.8.21
Recommended Action: Update to version 0.8.21, or a newer patched version

Plugin: Database Reset

Vulnerability: Privilege Escalation
Patched Version: 3.15
Recommended Action: Update to version 3.15, or a newer patched version

Plugin: WooCommerce

Vulnerability: Insecure Direct Object Reference via order_id Parameter
Patched Version: 4.7.0
Recommended Action: Update to version 4.7.0, or a newer patched version

Plugin: Resim Ara

Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: AccessAlly

Vulnerability: Arbitrary Code Execution
Patched Version: 3.3.2
Recommended Action: Update to version 3.3.2, or a newer patched version

Plugin: Flamingo

Vulnerability: CSV Injection
Patched Version: 2.1.1
Recommended Action: Update to version 2.1.1, or a newer patched version

Plugin: Chained Quiz

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.1.8.2
Recommended Action: Update to version 1.1.8.2, or a newer patched version

Plugin: Database Reset

Vulnerability: Unauthenticated Database Reset
Patched Version: 3.15
Recommended Action: Update to version 3.15, or a newer patched version

Plugin: Contextual Adminbar Color

Vulnerability: Stored Cross-Site Scripting
Patched Version: 0.3
Recommended Action: Update to version 0.3, or a newer patched version

Plugin: Marketo Forms and Tracking

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Elementor Website Builder – More than Just a Page Builder

Vulnerability: Cross-Site Scripting
Patched Version: 2.8.4
Recommended Action: Update to version 2.8.4, or a newer patched version

Plugin: Slideshow, Image Slider by 2J

Vulnerability: Authorization Bypass
Patched Version: 1.3.33
Recommended Action: Update to version 1.3.33, or a newer patched version

Plugin: All-in-One WP Migration and Backup

Vulnerability: Unauthenticated Backup Download
Patched Version: 7.15
Recommended Action: Update to version 7.15, or a newer patched version

Plugin: YOP Poll

Vulnerability: Reflected Cross-Site Scripting
Patched Version: 6.1.2
Recommended Action: Update to version 6.1.2, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress