Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: WpStream – Live Streaming, Video on Demand, Pay Per View
Vulnerability: Cross-Site Request Forgery via wpstream_settings
Patched Version: 4.4.10.6
Recommended Action: Update to version 4.4.10.6, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘pt_cancel_subscription’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: Toolset Types – Custom Post Types, Custom Fields and Taxonomies
Vulnerability: Authenticated (Administrator+) Arbitrary File Upload
Patched Version: 3.4.18
Recommended Action: Update to version 3.4.18, or a newer patched version
Plugin: WP Statistics – The Most Popular Privacy-Friendly Analytics Plugin
Vulnerability: Authenticated (Admin+) SQL Injection
Patched Version: 14.0
Recommended Action: Update to version 14.0, or a newer patched version
Plugin: CP Contact Form with PayPal
Vulnerability: Authenticated Feedback Submission
Patched Version: 1.3.35
Recommended Action: Update to version 1.3.35, or a newer patched version
Plugin: DeepL API translation plugin
Vulnerability: Cross-Site Request Forgery via saveSettings
Patched Version: 2.1.5
Recommended Action: Update to version 2.1.5, or a newer patched version
Plugin: Jetpack CRM – Clients, Leads, Invoices, Billing, Email Marketing, & Automation
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 5.5.0
Recommended Action: Update to version 5.5.0, or a newer patched version
Plugin: Simple CSV/XLS Exporter
Vulnerability: CSV Injection
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Schedulicity – Easy Online Scheduling
Vulnerability: Easy Online Scheduling <= 2.21
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: WP Meteor Website Speed Optimization Addon
Vulnerability: No subtitle
Patched Version: 3.1.5
Recommended Action: Update to version 3.1.5, or a newer patched version
Plugin: Blog Floating Button
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.4.13
Recommended Action: Update to version 1.4.13, or a newer patched version
Plugin: LWS Tools
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.4
Recommended Action: Update to version 2.4, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘update_profile_preference’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: Leyka
Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: 3.30
Recommended Action: Update to version 3.30, or a newer patched version
Plugin: Button Generator – easily Button Builder
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 2.3.4
Recommended Action: Update to version 2.3.4, or a newer patched version
Plugin: WP Speed Optimization By Add Expires Headers & Optimized Minify Plugin
Vulnerability: Cross-Site Request Forgery via [placeholder]
Patched Version: 2.7.1
Recommended Action: Update to version 2.7.1, or a newer patched version
Plugin: WP SMS – Ultimate SMS & MMS Notifications, 2FA, OTP, and Integrations with WooCommerce, GravityForms, and More
Vulnerability: Information Disclosure via REST API
Patched Version: 6.0.4.1
Recommended Action: Update to version 6.0.4.1, or a newer patched version
Plugin: DecaLog
Vulnerability: Cross-Site Request Forgery via get_settings_page
Patched Version: 3.7.1
Recommended Action: Update to version 3.7.1, or a newer patched version
Plugin: Hotel Listing
Vulnerability: Authenticated (Subscriber+) Privilege Escalation
Patched Version: 1.3.7
Recommended Action: Update to version 1.3.7, or a newer patched version
Plugin: About Me 3000 widget
Vulnerability: Cross-Site Request Forgery to Plugin Settings Update
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Watu Quiz
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.3.9.1
Recommended Action: Update to version 3.3.9.1, or a newer patched version
Plugin: ClickFunnels
Vulnerability: Cross-Site Request Forgery to Settings Update
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Simple Vimeo Shortcode
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via shortcode
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor
Vulnerability: reCaptcha Protection Bypass
Patched Version: 3.2.2
Recommended Action: Update to version 3.2.2, or a newer patched version
Plugin: Instant Images – One-click Image Uploads from Unsplash, Openverse, Pixabay, Pexels, and Giphy
Vulnerability: Authenticated (Author+) Server-Side Request Forgery via instant_images_download
Patched Version: 5.1.0.2
Recommended Action: Update to version 5.1.0.2, or a newer patched version
Plugin: Fontiran
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Complianz – GDPR/CCPA Cookie Consent
Vulnerability: GDPR/CCPA Cookie Consent <= 6.4.1
Patched Version: 6.4.2
Recommended Action: Update to version 6.4.2, or a newer patched version
Plugin: Cost Calculator
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Gallery Blocks with Lightbox. Image Gallery, (HTML5 video , YouTube, Vimeo) Video Gallery and Lightbox for native gallery
Vulnerability: Missing Authorization in pgc_sgb_action_wizard
Patched Version: 3.0.8
Recommended Action: Update to version 3.0.8, or a newer patched version
Plugin: Resize at Upload Plus
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Poll | Vote | Contest – Best Poll Plugin for WordPress
Vulnerability: Cross-Site Request Forgery
Patched Version: 4.8.7
Recommended Action: Update to version 4.8.7, or a newer patched version
Plugin: Namaste! LMS
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting via ‘accept_other_payment_methods’, ‘other_payment_methods’ Parameters
Patched Version: 2.6
Recommended Action: Update to version 2.6, or a newer patched version
Plugin: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider
Vulnerability: Authenticated (Author+) Stored Cross-Site Scripting via Email Logs
Patched Version: 2.2.3
Recommended Action: Update to version 2.2.3, or a newer patched version
Plugin: When Last Login
Vulnerability: Cross-Site Request Forgery via wll_hide_subscription_notice
Patched Version: 1.2.2
Recommended Action: Update to version 1.2.2, or a newer patched version
Plugin: FareHarbor for WordPress
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 3.6.7
Recommended Action: Update to version 3.6.7, or a newer patched version
Plugin: WP Clean Up
Vulnerability: Cross-Site Request Forgery via wp_clean_up_optimize
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder
Vulnerability: IP Spoofing via HTTP header
Patched Version: 6.1
Recommended Action: Update to version 6.1, or a newer patched version
Plugin: Cookie Notice & Compliance for GDPR / CCPA
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via ‘cookies_revoke_shortcode’ Shortcode
Patched Version: 2.4.7
Recommended Action: Update to version 2.4.7, or a newer patched version
Plugin: menu shortcode
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Cookie Notice & Compliance for GDPR / CCPA
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting via ‘cookies_policy_link’ Shortcodes
Patched Version: 2.4.7
Recommended Action: Update to version 2.4.7, or a newer patched version
Plugin: Manage Upload Limit
Vulnerability: Reflected Cross-Site Scripting via upload_limit
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: CPO Content Types
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Leyka
Vulnerability: Cross-Site Request Forgery
Patched Version: 3.30
Recommended Action: Update to version 3.30, or a newer patched version
Plugin: Easy Testimonial Slider and Form
Vulnerability: Unauthenticated Reflected Cross-Site Scripting via search_term
Patched Version: 1.0.16
Recommended Action: Update to version 1.0.16, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘paytium_sw_save_api_keys’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: WP Translitera
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘check_for_verified_profiles’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: YASR – Yet Another Star Rating Plugin for WordPress
Vulnerability: Authenticated (Subscriber+) Cross-Site Scripting via Shortcodes
Patched Version: 3.1.3
Recommended Action: Update to version 3.1.3, or a newer patched version
Plugin: New Adman
Vulnerability: Cross-Site Request Forgery via plugin_menu
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Dokan – Powerful WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy
Vulnerability: Authenticated (Vendor+) SQL Injection
Patched Version: 3.7.13
Recommended Action: Update to version 3.7.13, or a newer patched version
Plugin: Yoast SEO
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: 20.2.1
Recommended Action: Update to version 20.2.1, or a newer patched version
Plugin: Fontiran
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Classic Editor and Classic Widgets
Vulnerability: Cross-Site Request Forgery via render_settings_page
Patched Version: 1.2.6
Recommended Action: Update to version 1.2.6, or a newer patched version
Plugin: WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing
Vulnerability: Authenticated (Subscriber+) Local File Inclusion via ‘style’
Patched Version: 4.0.8
Recommended Action: Update to version 4.0.8, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘create_mollie_account’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: Event Espresso – Event Registration & Ticketing Sales
Vulnerability: Feature Bypass
Patched Version: 4.10.45.decaf
Recommended Action: Update to version 4.10.45.decaf, or a newer patched version
Plugin: New Adman
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Elegant Custom Fonts
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.0.1
Recommended Action: Update to version 1.0.1, or a newer patched version
Plugin: GTmetrix for WordPress
Vulnerability: Reflected Cross-Site Scripting via ‘url’
Patched Version: 0.4.6
Recommended Action: Update to version 0.4.6, or a newer patched version
Plugin: Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation
Vulnerability: Authenticated (Subscriber+) Sensitive Information Disclosure via Shortcode
Patched Version: 2.12.2
Recommended Action: Update to version 2.12.2, or a newer patched version
Plugin: CMP – Coming Soon & Maintenance Plugin by NiteoThemes
Vulnerability: Information Exposure
Patched Version: 4.1.7
Recommended Action: Update to version 4.1.7, or a newer patched version
Plugin: Calculated Fields Form
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.1.121
Recommended Action: Update to version 1.1.121, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘paytium_notice_dismiss’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: Rife Elementor Extensions & Templates
Vulnerability: Missing Authorization via import_templates
Patched Version: 1.2.0
Recommended Action: Update to version 1.2.0, or a newer patched version
Plugin: Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD
Vulnerability: Reflected Cross-Site Scripting via cart_search
Patched Version: 3.1.6
Recommended Action: Update to version 3.1.6, or a newer patched version
Plugin: JCH Optimize
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting via admin settings
Patched Version: 3.2.3
Recommended Action: Update to version 3.2.3, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘check_mollie_account_details’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
Plugin: Search in Place
Vulnerability: Cross-Site Request Forgery to Feedback Submission
Patched Version: 1.0.105
Recommended Action: Update to version 1.0.105, or a newer patched version
Plugin: Sales Report Email for WooCommerce
Vulnerability: Missing Authorization for Email Functionality
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Admin CSS MU
Vulnerability: Server-Side Request Forgery
Patched Version: 2.7
Recommended Action: Update to version 2.7, or a newer patched version
Plugin: Paytium: Mollie payment forms & donations
Vulnerability: Missing Authorization in ‘create_mollie_profile’
Patched Version: 4.4
Recommended Action: Update to version 4.4, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.