Understanding Vulnerabilities in WordPress Plugins
Every week, we highlight known vulnerabilities in WordPress plugins. This information helps you stay informed about potential risks and take appropriate action to protect your website. By addressing these vulnerabilities, you ensure the safety and integrity of your WordPress site and its data.
Plugin: We’re Open!
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.38
Recommended Action: Update to version 1.38, or a newer patched version
Plugin: Culture Object
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 4.1.1
Recommended Action: Update to version 4.1.1, or a newer patched version
Plugin: Top Bar
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 3.0.4
Recommended Action: Update to version 3.0.4, or a newer patched version
Plugin: DSGVO All in one for WP
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 4.3
Recommended Action: Update to version 4.3, or a newer patched version
Plugin: 3DPrint
Vulnerability: Cross-Site Request Forgery to Arbitrary File Download
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Corner Ad
Vulnerability: Cross-Site Request Forgery
Patched Version: 1.0.57
Recommended Action: Update to version 1.0.57, or a newer patched version
Plugin: WPGateway
Vulnerability: Unauthenticated Privilege Escalation
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Add Shortcodes Actions And Filters
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: PCA Predict
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: wpForo Forum
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version
Plugin: Dokan – Powerful WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy
Vulnerability: Authenticated (Vendor+) Stored Cross-Site Scripting
Patched Version: 3.6.4
Recommended Action: Update to version 3.6.4, or a newer patched version
Plugin: Photospace Gallery
Vulnerability: Missing Authorization to Plugin Settings Update
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Read more By Adam
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: WP Statistics – The Most Popular Privacy-Friendly Analytics Plugin
Vulnerability: Authenticated (Subscriber+) SQL Injection
Patched Version: 13.2.6
Recommended Action: Update to version 13.2.6, or a newer patched version
Plugin: Frontend File Manager Plugin
Vulnerability: Authenticated (Subscriber+) Arbitrary File Upload
Patched Version: 21.3
Recommended Action: Update to version 21.3, or a newer patched version
Plugin: Zephyr Project Manager
Vulnerability: Missing Authorization to Cross-Site Scripting
Patched Version: 3.2.55
Recommended Action: Update to version 3.2.55, or a newer patched version
Plugin: WP Statistics – The Most Popular Privacy-Friendly Analytics Plugin
Vulnerability: Information Disclosure
Patched Version: 13.2.6
Recommended Action: Update to version 13.2.6, or a newer patched version
Plugin: Advanced Dynamic Pricing for WooCommerce
Vulnerability: Cross-Site Request Forgery to Plugin Settings Update
Patched Version: 4.1.4
Recommended Action: Update to version 4.1.4, or a newer patched version
Plugin: Export Post Info
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 1.2.0
Recommended Action: Update to version 1.2.0, or a newer patched version
Plugin: wpForo Forum
Vulnerability: Cross-Site Request Forgery
Patched Version: 2.0.6
Recommended Action: Update to version 2.0.6, or a newer patched version
Plugin: YDS Support Ticket System
Vulnerability: Cross-Site Request Forgery
Patched Version: No patched version available
Recommended Action: No known patch available. Please review the vulnerability’s details in depth and employ mitigations based on your organization’s risk tolerance. It may be best to uninstall the affected software and find a replacement.
Plugin: Donation Thermometer
Vulnerability: Authenticated (Administrator+) Stored Cross-Site Scripting
Patched Version: 2.1.3
Recommended Action: Update to version 2.1.3, or a newer patched version
Plugin: Frontend File Manager Plugin
Vulnerability: Missing Authorization
Patched Version: 21.3
Recommended Action: Update to version 21.3, or a newer patched version
Plugin: Contact Form By Mega Forms – Drag and Drop Form Builder
Vulnerability: Authenticated (Subscriber+) Stored Cross-Site Scripting
Patched Version: 1.2.5
Recommended Action: Update to version 1.2.5, or a newer patched version
Plugin: RD Station
Vulnerability: Cross-Site Request Forgery to Plugin Settings Update
Patched Version: 5.2.1
Recommended Action: Update to version 5.2.1, or a newer patched version
***
Check out the Watch Out Wednesday Archive for past Watch Out Wednesday posts.