Watch Out Wednesday – November 2, 2022

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Advanced Dynamic Pricing for WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 4.1.6
Recommended Action: Update to version 4.1.6, or a newer patched version

Plugin: Restaurant Menu – Food Ordering System – Table Reservation

Vulnerability: Missing Authorization on AJAX Actions
Patched Version: 2.3.1
Recommended Action: Update to version 2.3.1, or a newer patched version

Plugin: Event Monster – Event Management, Tickets Booking, Upcoming Event

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.2.0
Recommended Action: Update to version 1.2.0, or a newer patched version

Plugin: ProfileGrid – User Profiles, Groups and Communities

Vulnerability: Missing Authorization to Information Exposure
Patched Version: 5.0.4
Recommended Action: Update to version 5.0.4, or a newer patched version

Plugin: Custom Product Tabs for WooCommerce

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.8.0
Recommended Action: Update to version 1.8.0, or a newer patched version

Plugin: WP Bootstrap Gallery

Vulnerability: Missing Authorization
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Slideshow SE

Vulnerability: Authenticated (Author+) Stored Cross-Site Scripting
Patched Version: 2.5.6
Recommended Action: Update to version 2.5.6, or a newer patched version

Plugin: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Vulnerability: Authenticated (Admin+) Directory Traversal
Patched Version: 2.5.1
Recommended Action: Update to version 2.5.1, or a newer patched version

Plugin: WatchTowerHQ

Vulnerability: Unauthenticated Arbitrary File Download
Patched Version: 3.6.16
Recommended Action: Update to version 3.6.16, or a newer patched version

Plugin: DeepL API translation plugin

Vulnerability: Sensitive Information Disclosure
Patched Version: 1.7.5
Recommended Action: Update to version 1.7.5, or a newer patched version

Plugin: Booster for WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 5.6.7
Recommended Action: Update to version 5.6.7, or a newer patched version

Plugin: Syncee Collective Dropshipping

Vulnerability: Missing Authorization.
Patched Version: 1.0.10
Recommended Action: Update to version 1.0.10, or a newer patched version

Plugin: Contact Form 7 Database Addon – CFDB7

Vulnerability: CSV Injection
Patched Version: 1.2.6.5
Recommended Action: Update to version 1.2.6.5, or a newer patched version

Plugin: AFS Analytics

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 4.16
Recommended Action: Update to version 4.16, or a newer patched version

Plugin: All in One SEO Pro – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic

Vulnerability: Authenticated (Admin+) Server Side Request Forgery
Patched Version: 4.2.6
Recommended Action: Update to version 4.2.6, or a newer patched version

Plugin: Appointment Booking Calendar

Vulnerability: Missing Authorization
Patched Version: 1.3.70
Recommended Action: Update to version 1.3.70, or a newer patched version

Plugin: Five Star Restaurant Reservations – WordPress Booking Plugin

Vulnerability: Missing Authorization to Stored Cross-Site Scripting
Patched Version: 2.4.12
Recommended Action: Update to version 2.4.12, or a newer patched version

Plugin: Creative Mail – Easier WordPress & WooCommerce Email Marketing

Vulnerability: Cross-Site Request Forgery to Plugin Deactivation
Patched Version: 1.6.0
Recommended Action: Update to version 1.6.0, or a newer patched version

Plugin: Modula Image Gallery

Vulnerability: Missing Authorization to Plugin Settings Change
Patched Version: 2.6.91
Recommended Action: Update to version 2.6.91, or a newer patched version

Plugin: WatchTowerHQ

Vulnerability: Unauthenticated Arbitrary File Deletion
Patched Version: 3.6.16
Recommended Action: Update to version 3.6.16, or a newer patched version

Plugin: JetBackup – WP Backup, Migrate & Restore

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.6.9.1
Recommended Action: Update to version 1.6.9.1, or a newer patched version

Plugin: Booster Plus for WooCommerce

Vulnerability: Cross-Site Request Forgery to File Deletion
Patched Version: 5.6.5
Recommended Action: Update to version 5.6.5, or a newer patched version

Plugin: Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC)

Vulnerability: Authenticated (Contributor+) Stored Stored Cross-Site Scripting
Patched Version: 2.7.3
Recommended Action: Update to version 2.7.3, or a newer patched version

Plugin: Registration, User Profile, Membership, Content Restriction, User Directory, and Frontend Post Submission – WP User Frontend

Vulnerability: Privilege Escalation
Patched Version: 3.5.29
Recommended Action: Update to version 3.5.29, or a newer patched version

Plugin: Appointment Hour Booking – WordPress Booking Plugin

Vulnerability: Missing Authorization
Patched Version: 1.3.72
Recommended Action: Update to version 1.3.72, or a newer patched version

Plugin: Popup Maker – Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.16.11
Recommended Action: Update to version 1.16.11, or a newer patched version

Plugin: Download Monitor

Vulnerability: Authenticated Directory Traversal to Sensitive Information Exposure
Patched Version: 4.7.3
Recommended Action: Update to version 4.7.3, or a newer patched version

Plugin: Gallery with thumbnail slider

Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: 6.1
Recommended Action: Update to version 6.1, or a newer patched version

Plugin: Spacer

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 3.0.7
Recommended Action: Update to version 3.0.7, or a newer patched version

Plugin: Zoho CRM Lead Magnet

Vulnerability: Missing Authorization to Authenticated (Subscriber+) Arbitrary Options Update
Patched Version: 1.7.5.9
Recommended Action: Update to version 1.7.5.9, or a newer patched version

Plugin: Api2Cart Bridge Connector

Vulnerability: Arbitrary File Upload
Patched Version: 1.2.0
Recommended Action: Update to version 1.2.0, or a newer patched version

Plugin: Forms by CaptainForm – Form Builder for WordPress

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Booster Elite for WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.1.7
Recommended Action: Update to version 1.1.7, or a newer patched version

Plugin: Wallet for WooCommerce

Vulnerability: Cross-Site Request Forgery via lock_unlock_terawallet
Patched Version: 1.4.0
Recommended Action: Update to version 1.4.0, or a newer patched version

Plugin: Advanced Coupons – WooCommerce Coupons, Store Credit, Gift Cards, Loyalty Program, BOGO Coupons, Discount Rules

Vulnerability: Cross-Site Request Forgery
Patched Version: 4.5.0.1
Recommended Action: Update to version 4.5.0.1, or a newer patched version

Plugin: Restaurant Menu – Food Ordering System – Table Reservation

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.3.2
Recommended Action: Update to version 2.3.2, or a newer patched version

Plugin: Booster Plus for WooCommerce

Vulnerability: Authenticated (Shop Manager+) Information Exposure via Arbitrary File Download
Patched Version: 5.6.5
Recommended Action: Update to version 5.6.5, or a newer patched version

Plugin: WP Best Quiz

Vulnerability: Authenticated (Author+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Web Stories

Vulnerability: Server Side Request Forgery
Patched Version: 1.25.0
Recommended Action: Update to version 1.25.0, or a newer patched version

Plugin: Gallery Images Ape

Vulnerability: Authenticated (Contributor+) Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: WP Glossary

Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Booster Elite for WooCommerce

Vulnerability: Authenticated (Admin/Shop Manager+) Arbitrary File Download
Patched Version: 1.1.7
Recommended Action: Update to version 1.1.7, or a newer patched version

Plugin: Authorizer

Vulnerability: Service Hostname Discovery Exploitation
Patched Version: 1.6.0
Recommended Action: Update to version 1.6.0, or a newer patched version

Plugin: reSmush.it : The original free image compressor and optimizer plugin

Vulnerability: Cross-Site Request Forgery
Patched Version: 0.4.7
Recommended Action: Update to version 0.4.7, or a newer patched version

Plugin: Advanced Dynamic Pricing for WooCommerce

Vulnerability: Cross-Site Request Forgery
Patched Version: 4.1.6
Recommended Action: Update to version 4.1.6, or a newer patched version

Plugin: Homepage Pop-up

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Vulnerability: Authenticated (Contributor+) Directory Traversal via Shortcodes
Patched Version: 2.5.1
Recommended Action: Update to version 2.5.1, or a newer patched version

Plugin: Content Egg

Vulnerability: Cross-Site Request Forgery
Patched Version: 5.5.0
Recommended Action: Update to version 5.5.0, or a newer patched version

Plugin: Gallery Images Ape

Vulnerability: Missing Authorization
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Slideshow SE

Vulnerability: Authenticated (Subscriber+) Cross-Site Scripting
Patched Version: 2.5.6
Recommended Action: Update to version 2.5.6, or a newer patched version

Plugin: Api2Cart Bridge Connector

Vulnerability: Arbitrary Code Execution
Patched Version: 1.2.0
Recommended Action: Update to version 1.2.0, or a newer patched version

Plugin: Creative Mail – Easier WordPress & WooCommerce Email Marketing

Vulnerability: Cross-Site Request Forgery
Patched Version: 1.6.0
Recommended Action: Update to version 1.6.0, or a newer patched version

Plugin: Evaluate

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Google Authenticator – WordPress 2FA, OTP SMS and Email

Vulnerability: Missing Authorization to Plugin Settings Change
Patched Version: 5.6.2
Recommended Action: Update to version 5.6.2, or a newer patched version

Plugin: WP-Polls

Vulnerability: IP Validation Bypass
Patched Version: 2.76.0
Recommended Action: Update to version 2.76.0, or a newer patched version

Plugin: Syncee for Suppliers

Vulnerability: Missing Authorization to Sensitive Information Disclosure
Patched Version: 1.0.10
Recommended Action: Update to version 1.0.10, or a newer patched version

Plugin: Mantenimiento web

Vulnerability: Cross-Site Request Forgery
Patched Version: 0.9
Recommended Action: Update to version 0.9, or a newer patched version

Plugin: Event Monster – Event Management, Tickets Booking, Upcoming Event

Vulnerability: Authenticated (Administrator+) SQL Injection
Patched Version: 1.2.1
Recommended Action: Update to version 1.2.1, or a newer patched version

Plugin: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Vulnerability: Authenticated (Admin+) Limited Remote Code Execution via um_populate_dropdown_options
Patched Version: 2.5.1
Recommended Action: Update to version 2.5.1, or a newer patched version

Plugin: Creative Mail – Easier WordPress & WooCommerce Email Marketing

Vulnerability: Cross-Site Request Forgery to Settings Disconnect
Patched Version: 1.6.0
Recommended Action: Update to version 1.6.0, or a newer patched version

Plugin: Super Testimonials

Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 2.7
Recommended Action: Update to version 2.7, or a newer patched version

Plugin: Permalink Manager Lite

Vulnerability: Missing Authorization
Patched Version: 2.2.20.1
Recommended Action: Update to version 2.2.20.1, or a newer patched version

Plugin: Contact Us Page – Contact People

Vulnerability: Cross-Site Request Forgery to Settings Reset
Patched Version: 3.6.2
Recommended Action: Update to version 3.6.2, or a newer patched version

Plugin: My wpdb

Vulnerability: Cross-Site Request Forgery to Arbitrary SQL Query Execution
Patched Version: 2.5
Recommended Action: Update to version 2.5, or a newer patched version

Plugin: Homepage Pop-up

Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Comments – wpDiscuz

Vulnerability: Insecure Direct Object References
Patched Version: 7.5
Recommended Action: Update to version 7.5, or a newer patched version

Plugin: Wallet for WooCommerce

Vulnerability: Insecure Direct Object Reference
Patched Version: 1.4.4
Recommended Action: Update to version 1.4.4, or a newer patched version

Plugin: Google Authenticator – WordPress 2FA, OTP SMS and Email

Vulnerability: Cross-Site Request Forgery to Malware Scan Termination
Patched Version: 5.6.2
Recommended Action: Update to version 5.6.2, or a newer patched version

Plugin: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Vulnerability: Authenticated (Admin+) Remote Code Execution via Multi-Select
Patched Version: 2.5.1
Recommended Action: Update to version 2.5.1, or a newer patched version

Plugin: Subscribe to Category

Vulnerability: Missing Authorization
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress