Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Appointment Booking Calendar
Vulnerability: Stored Cross-Site Scripting
Patched Version: 1.3.35
Recommended Action: Update to version 1.3.35, or a newer patched version
Plugin: WPML
Vulnerability: Cross-Site Request Forgery Bypass
Patched Version: 4.3.7
Recommended Action: Update to version 4.3.7, or a newer patched version
Plugin: ThemeREX Addons
Vulnerability: Missing Authorization
Patched Version: 1.6.49.10
Recommended Action: Update to one of the following versions, or a newer patched version: 1.6.49.10, 1.6.49.6, 1.6.49.6.3, 1.6.49.7, 1.6.50.2, 1.6.51.4, 1.6.52.3, 1.6.53.4, 1.6.54.1, 1.6.55.8, 1.6.56.1, 1.6.57.4, 1.6.58.3, 1.6.59.1.2, 1.6.59.4, 1.6.60.1, 1.6.61.1.1, 1.6.61.2.1, 1.6.62.4, 1.6.65.1, 1.6.66.1, 1.6.67.1, 1.70.3.1
Plugin: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Vulnerability: Cross-Site Request Forgery to Settings Modification
Patched Version: 4.6.0.4
Recommended Action: Update to version 4.6.0.4, or a newer patched version
Plugin: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Vulnerability: Authenticated Privilege Escalation
Patched Version: 4.6.0.4
Recommended Action: Update to version 4.6.0.4, or a newer patched version
Plugin: Custom Searchable Data Entry System
Vulnerability: Unauthenticated Database Wiping
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Appointment Booking Calendar
Vulnerability: CSV Injection
Patched Version: 1.3.35
Recommended Action: Update to version 1.3.35, or a newer patched version
Plugin: Responsive Plus – Starter Templates, Advanced Features and Customizer Settings for Responsive Theme.
Vulnerability: Unprotected AJAX Actions
Patched Version: 2.2.7
Recommended Action: Update to version 2.2.7, or a newer patched version
Plugin: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Vulnerability: Authenticated Settings and User Data Export
Patched Version: 4.6.0.4
Recommended Action: Update to version 4.6.0.4, or a newer patched version
Plugin: WordPress WP-Advanced-Search
Vulnerability: Remote Code Execution
Patched Version: 3.3.4
Recommended Action: Update to version 3.3.4, or a newer patched version
Plugin: WP Activity Log
Vulnerability: Missing Authorization
Patched Version: 4.0.2
Recommended Action: Update to version 4.0.2, or a newer patched version
Plugin: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Vulnerability: Authenticated Email Injection
Patched Version: 4.6.0.4
Recommended Action: Update to version 4.6.0.4, or a newer patched version
Plugin: WordPress WP-Advanced-Search
Vulnerability: Unauthenticated Database Export
Patched Version: 3.3.4
Recommended Action: Update to version 3.3.4, or a newer patched version
Plugin: Brizy – Page Builder
Vulnerability: Page Builder < 1.0.114
Patched Version: 1.0.114
Recommended Action: Update to version 1.0.114, or a newer patched version
Plugin: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Vulnerability: Authenticated Settings Import to Privilege Escalation
Patched Version: 4.6.0.4
Recommended Action: Update to version 4.6.0.4, or a newer patched version
Plugin: WooCommerce Smart Coupons
Vulnerability: Unauthenticated Coupon Creation
Patched Version: 4.6.5
Recommended Action: Update to version 4.6.5, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.