Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More
Vulnerability: Cross-Site Scripting
Patched Version: 1.6.0.2
Recommended Action: Update to version 1.6.0.2, or a newer patched version
Plugin: ThirstyAffiliates – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin
Vulnerability: Stored Cross-Site Scripting
Patched Version: 3.9.3
Recommended Action: Update to version 3.9.3, or a newer patched version
Plugin: multi Scheduler
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder
Vulnerability: SQL Injection
Patched Version: 1.13.36
Recommended Action: Update to version 1.13.36, or a newer patched version
Plugin: Site Kit by Google – Analytics, Search Console, AdSense, Speed
Vulnerability: Sensitive Information Disclosure
Patched Version: 1.8.0
Recommended Action: Update to version 1.8.0, or a newer patched version
Plugin: MailerLite – Signup forms (official)
Vulnerability: Unauthenticated SQL Injection
Patched Version: 1.4.4
Recommended Action: Update to version 1.4.4, or a newer patched version
Plugin: MailerLite – Signup forms (official)
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.4.5
Recommended Action: Update to version 1.4.5, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.