Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Tickera – WordPress Event Ticketing
Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: 3.4.8.3
Recommended Action: Update to version 3.4.8.3, or a newer patched version
Plugin: Icegram Engage – Ultimate WP Popup Builder, Lead Generation, Optins, and CTA
Vulnerability: Reflected Cross-Site Scripting via message_id
Patched Version: 2.0.5
Recommended Action: Update to version 2.0.5, or a newer patched version
Plugin: Easy Registration Forms
Vulnerability: Cross-Site Request Forgery to Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: WP Guppy
Vulnerability: Information Disclosure
Patched Version: 1.3
Recommended Action: Update to version 1.3, or a newer patched version
Plugin: HTML5 Responsive FAQ
Vulnerability: Authenticated Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: WCFM Marketplace – Multivendor Marketplace for WooCommerce
Vulnerability: WooCommerce Multivendor Marketplace <= 3.4.11
Patched Version: 3.4.12
Recommended Action: Update to version 3.4.12, or a newer patched version
Plugin: ExportFeed: List WooCommerce Products on eBay Store
Vulnerability: SQL Injection
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Logo Carousel – Responsive Logo Slider, Logo Showcase, and Clients Logo Gallery
Vulnerability: Unauthorised Private Post Access
Patched Version: 3.4.2
Recommended Action: Update to version 3.4.2, or a newer patched version
Plugin: Login/Signup Popup ( Inline Form + Woocommerce )
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.2
Recommended Action: Update to version 2.2, or a newer patched version
Plugin: Registration, User Profile, Membership, Content Restriction, User Directory, and Frontend Post Submission – WP User Frontend
Vulnerability: Authenticated (Admin+) SQL Injection
Patched Version: 3.5.25
Recommended Action: Update to version 3.5.25, or a newer patched version
Plugin: Logo Carousel – Responsive Logo Slider, Logo Showcase, and Clients Logo Gallery
Vulnerability: Contributor+ Stored Cross-Site Scripting
Patched Version: 3.4.2
Recommended Action: Update to version 3.4.2, or a newer patched version
Plugin: Child Theme Generator
Vulnerability: No subtitle
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Cybersoldier
Vulnerability: Authenticated (Admin+) Stored Cross-Site Scripting
Patched Version: 1.7.0
Recommended Action: Update to version 1.7.0, or a newer patched version
Plugin: WPFront User Role Editor
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.2.1.11184
Recommended Action: Update to version 3.2.1.11184, or a newer patched version
Plugin: Child Theme Generator
Vulnerability: Reflected Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Blog2Social: Social Media Auto Post & Scheduler
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 6.8.7
Recommended Action: Update to version 6.8.7, or a newer patched version
Plugin: Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.6.6
Recommended Action: Update to version 2.6.6, or a newer patched version
Plugin: Logo Carousel
Vulnerability: Stored Cross-Site Scripting
Patched Version: 1.7.2
Recommended Action: Update to version 1.7.2, or a newer patched version
Plugin: Kudos Donations – Easy donations and payments with Mollie
Vulnerability: Cross-Site Request Forgery
Patched Version: 3.1.2
Recommended Action: Update to version 3.1.2, or a newer patched version
Plugin: Ninja Forms – File Uploads
Vulnerability: File Uploads Extension <= 3.3.12
Patched Version: 3.3.13
Recommended Action: Update to version 3.3.13, or a newer patched version
Plugin: Backup Migration
Vulnerability: Authenticated (Admin+) Stored Cross-Site Scripting
Patched Version: 1.1.6
Recommended Action: Update to version 1.1.6, or a newer patched version
Plugin: Pixel Cat – Conversion Pixel Manager
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.6.4
Recommended Action: Update to version 2.6.4, or a newer patched version
Plugin: Simple Slider
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.1
Recommended Action: Update to version 1.1, or a newer patched version
Plugin: Gwolle Guestbook
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 4.2
Recommended Action: Update to version 4.2, or a newer patched version
Plugin: IDPay for Contact Form 7
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.3.2
Recommended Action: Update to version 2.3.2, or a newer patched version
Plugin: Everest Forms – Build Contact Forms, Surveys, Polls, Quizzes, Newsletter & Application Forms, and Many More with Ease!
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 1.8.0
Recommended Action: Update to version 1.8.0, or a newer patched version
Plugin: Preview E-mails for WooCommerce
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 2.0.0
Recommended Action: Update to version 2.0.0, or a newer patched version
Plugin: Ni WooCommerce Custom Order Status
Vulnerability: SQL Injection
Patched Version: 1.9.7
Recommended Action: Update to version 1.9.7, or a newer patched version
Plugin: WPFront User Role Editor
Vulnerability: Reflected Cross-Site Scripting
Patched Version: 3.2.1
Recommended Action: Update to version 3.2.1, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.