Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: Brizy – Page Builder
Vulnerability: Incorrect Authorization Checks Allowing Post Modification
Patched Version: 1.0.126
Recommended Action: Update to one of the following versions, or a newer patched version: 1.0.126, 2.3.12
Plugin: WPBakery Page Builder for WordPress
Vulnerability: Authenticated (Contributor+) Stored Cross-Site Scripting
Patched Version: 6.4.1
Recommended Action: Update to version 6.4.1, or a newer patched version
Plugin: Web Instant Messenger
Vulnerability: Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Autoptimize
Vulnerability: Arbitrary File Upload (and Remote Code Execution) via Import Settings
Patched Version: 2.7.8
Recommended Action: Update to version 2.7.8, or a newer patched version
Plugin: Autoptimize
Vulnerability: Unsafe File Upload to Cross-Site Scripting
Patched Version: 2.7.8
Recommended Action: Update to version 2.7.8, or a newer patched version
Plugin: PowerPress Podcasting plugin by Blubrry
Vulnerability: Arbitrary File Upload
Patched Version: 8.3.8
Recommended Action: Update to version 8.3.8, or a newer patched version
Plugin: HyperComments
Vulnerability: Arbitrary File Deletion
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Autoptimize
Vulnerability: Race Condition leading to Remote Code Execution
Patched Version: 2.7.8
Recommended Action: Update to version 2.7.8, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.