Watch Out Wednesday – October 28, 2020

Understanding Vulnerabilities in WordPress Plugins

Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.

Plugin: CM Download Manager – Document and File Management

Vulnerability: Authenticated Stored Cross-Site Scripting
Patched Version: 2.8.0
Recommended Action: Update to version 2.8.0, or a newer patched version

Plugin: Super Store Finder

Vulnerability: Arbitrary File Upload
Patched Version: 6.2
Recommended Action: Update to version 6.2, or a newer patched version

Plugin: PDF File Browser

Vulnerability: Remote Code Execution
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.

Plugin: Simple Download Monitor

Vulnerability: Unauthenticated Stored Cross-Site Scripting
Patched Version: 3.3.9
Recommended Action: Update to version 3.3.9, or a newer patched version

Plugin: Loginizer

Vulnerability: SQL Injection
Patched Version: 1.6.4
Recommended Action: Update to version 1.6.4, or a newer patched version

Plugin: Simple Download Monitor

Vulnerability: SQL Injection
Patched Version: 3.8.9
Recommended Action: Update to version 3.8.9, or a newer patched version

Plugin: Advanced Booking Calendar

Vulnerability: Unauthenticated SQL Injection
Patched Version: 1.6.2
Recommended Action: Update to version 1.6.2, or a newer patched version

***

Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.

About the Author

Recent Posts

WordPress