Watch Out Wednesday – November 25, 2020

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: Redux Framework

Vulnerability: Cross-Site Request Forgery
Patched Version: 4.1.21
Recommended Action: Update to version 4.1.21, or a newer patched version

Plugin: Import and export users and customers

Vulnerability: CSV injection via a customer’s profile
Patched Version: 1.16.3.6
Recommended Action: Update to version 1.16.3.6, or a newer patched version

Plugin: WooCommerce Anti-Fraud

Vulnerability: Insecure Direct Object Reference
Patched Version: 3.3
Recommended Action: Update to version 3.3, or a newer patched version

Plugin: Easy Registration Forms

Vulnerability: CSV Injection
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Orbit Fox by ThemeIsle

Vulnerability: Authenticated Privilege Escalation
Patched Version: 2.10.3
Recommended Action: Update to version 2.10.3, or a newer patched version

Plugin: Spam protection, Anti-Spam, FireWall by CleanTalk

Vulnerability: Authenticated SQL Injection
Patched Version: 5.149
Recommended Action: Update to version 5.149, or a newer patched version

Plugin: Secure File Manager

Vulnerability: Remote Code Execution
Patched Version: 2.8.2
Recommended Action: Update to version 2.8.2, or a newer patched version

Plugin: Fancy Product Designer

Vulnerability: Stored Cross-Site Scripting
Patched Version: 4.5.1
Recommended Action: Update to version 4.5.1, or a newer patched version

Plugin: Contextual Related Posts

Vulnerability: Cross-Site Request Forgery
Patched Version: 2.9.4
Recommended Action: Update to version 2.9.4, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress