WordPress Vulnerability Report – April 12, 2023


Warning: getimagesize(https://ps.w.org/wp-seopress/assets/banner-1544x500.png?rev=2769352): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/mappress-google-maps-for-wordpress/assets/Banner-1544x500.png?rev=2410210): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-limit-login-attempts/assets/banner-772x250.png?rev=1225433): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wc-multivendor-membership/assets/banner-772x250.png?rev=2569708): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/masterstudy-lms-learning-management-system/assets/banner-1544x500.jpg?rev=2364576): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/superb-social-share-and-follow-buttons/assets/banner-1544x500.png?rev=2467738): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/spreadshop/assets/banner-772x250.png?rev=2065530): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-easycart/assets/banner-1544x500.png?rev=1961544): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/spotify-play-button-for-wordpress/assets/banner-1544x500.png?rev=2437215): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/cancel-order-request-woocommerce/assets/banner-1544x500.png?rev=2472970): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/enquiry-quotation-for-woocommerce/assets/banner-1544x500.png?rev=2473015): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ht-builder/assets/banner-772x250.jpg?rev=2875683): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/intelly-welcome-bar/assets/banner-1544x500.png?rev=1329684): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/libsyn-podcasting/assets/banner-1544x500.jpg?rev=1266663): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/easy-sign-up/assets/banner-1544x500.png?rev=1190374): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/tiny-carousel-horizontal-slider-plus/assets/banner-772x250.png?rev=937204): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/solidres/assets/banner-1544x500.png?rev=1118630): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

This week, 79 vulnerabilities may affect over 6.6 million WordPress sites. There are 55 plugin vulnerabilities and 5 themes with security patches available, so run those updates if you use these plugins! Additionally, there are 19 plugin vulnerabilities with no patch available yet. At least three of these have been closed and dropped from the wordpress.org plugin directory so far. If you are using any unpatched plugins or themes, check their vendors’ intentions and progress on a security release. If no patch is forthcoming or the vulnerable plugin or theme has been closed, you should consider deactivation and removal in favor of alternative solutions.

For reference, these reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins that have not been updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new WordPress plugin, theme, and core vulnerabilities that have emerged since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you are using vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

WordPress Core News

WordPress 6.2 is the first major release of 2023, with over 900 enhancements and fixes. You’ll notice a reimagined Site Editor, blocks get even better, and new tools and improvements in WordPress 6.2. As always, with a major release like this, ensure your site is backed up with BackupBuddy before updating.

If your WordPress sites have enabled automatic background updates, they should have upgraded to 6.2 automatically. You can download WordPress 6.2 from WordPress.org, or visit your WordPress Dashboard, click “Updates,” and then click the “Update Now” button, which will appear when any core updates are available. For more information, check out the version 6.2 HelpHub documentation page.

WordPress Plugin Vulnerabilities with Patches

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities that have been fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, which represent the largest target for attackers.

Advanced Custom Fields

Product image for Advanced Custom Fields (ACF).

Vulnerability
Authenticated (Contributor+) PHP Object Injection vulnerability
The vulnerability has been patched, so you should update to version 6.1.0.

WP Fastest Cache

Product image for WP Fastest Cache.

Vulnerability
Multiple Cross Site Request Forgery (CSRF)
CVE
2023-1926
The vulnerability has been patched, so you should update to version 1.1.3.

WP Fastest Cache

Product image for WP Fastest Cache.

CVE
2023-1931
The vulnerability has been patched, so you should update to version 1.1.3.

Health Check & Troubleshooting

Product image for Health Check & Troubleshooting.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.6.0.

PHP Compatibility Checker

Product image for PHP Compatibility Checker.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.6.0.

SEOPress

Product image for SEOPress – On-site SEO.

Vulnerability
Authenticated (Administrator+) PHP Object Injection
The vulnerability has been patched, so you should update to version 6.5.0.3.

Ajax Search Lite

Product image for Ajax Search Lite.

Vulnerability
Reflected Cross-Site Scripting (XSS)
CVE
2023-1420
The vulnerability has been patched, so you should update to version 4.11.1.

Maps Widget for Google Maps

Product image for Maps Widget for Google Maps.

Vulnerability
Authenticated (Administrator+) Stored Cross-Site Scripting
CVE
2023-1913
The vulnerability has been patched, so you should update to version 4.25.

Limit Login Attempts

Product image for WP Limit Login Attempts.

Vulnerability
Unauthenticated Stored Cross-Site Scripting
CVE
2023-1912
The vulnerability has been patched, so you should update to version 1.7.2.

PixTypes

Plugin
PixTypes
Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.4.15.

Simple Job Board

Product image for Simple Job Board.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.10.4.

Connections Business Directory

Product image for Connections Business Directory.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 10.4.37.

WP Data Access

CVE
2023-1874
The vulnerability has been patched, so you should update to version 5.3.8.

Magic Post Thumbnail

Product image for Magic Post Thumbnail.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.1.11.
Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.1.7.

Spreadshop Plugin

Product image for Spreadshop Plugin.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.6.6.

Sp*tify Play Button for WordPress

Product image for Sp*tify Play Button for WordPress.

Vulnerability
Auth. Stored Cross-Site Scripting (XSS)
CVE
2023-1840
The vulnerability has been patched, so you should update to version 2.08.

Spiffy Calendar

Product image for Spiffy Calendar.

Vulnerability
Auth. SQL Injection (SQLi)
The vulnerability has been patched, so you should update to version 4.9.2.

PropertyHive

Product image for PropertyHive.

Plugin
PropertyHive
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.5.47.

Albo Pretorio On line

Product image for Albo Pretorio On line.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.6.2.

Product Catalog Simple

Product image for Product Catalog Simple.

Vulnerability
Reflected Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.7.0.

CopySafe Web Protection

Product image for CopySafe Web Protection.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.14.

SMTP Mailing Queue

Vulnerability
Authenticated (Admin+) Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 2.0.0.

Welcome Bar

Product image for Welcome Bar.

Plugin
Welcome Bar
Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.0.4.

Welcome Bar

Product image for Welcome Bar.

Plugin
Welcome Bar
The vulnerability has been patched, so you should update to version 2.0.4.

User Role by BestWebSoft

Vulnerability
Privilege Escalation via CSRF
CVE
2023-0820
The vulnerability has been patched, so you should update to version 1.6.7.

Ajax Search Lite Pro

Vulnerability
Multiple Cross Site Scripting (XSS)
CVE
2023-1435
The vulnerability has been patched, so you should update to version 4.26.2.

Ajax Search Pro

Vulnerability
Reflected Cross Site Scripting (XSS)
CVE
2023-1420
The vulnerability has been patched, so you should update to version 4.26.2.

Fancy Product Designer

Vulnerability
Insufficient Authorization to Arbitrary Options Update via fpd_update_options
CVE
2021-4334
The vulnerability has been patched, so you should update to version 4.7.0.

Fancy Product Designer

Vulnerability
Insufficient Authorization on Multiple AJAX Actions
CVE
2021-4335
The vulnerability has been patched, so you should update to version 4.7.0.

Image Over Image For WPBakery Page Builder

Plugin
Image Over Image For WPBakery Page Builder
CVE
2023-0399
The vulnerability has been patched, so you should update to version 3.0.

Transbank Webpay REST

The vulnerability has been patched, so you should update to version 1.6.7.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

Libsyn Publisher Hub

Product image for Libsyn Publisher Hub.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Comment Reply Notification

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Cryptocurrency All-in-One

Product image for Cryptocurrency All-in-One.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Easy Sign Up

Product image for Easy Sign Up.

Plugin
Easy Sign Up
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

iframe Shortcode

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Tiny carousel horizontal slider plus

Product image for Tiny carousel horizontal slider plus.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

SimpleModal Contact Form (SMCF)

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

tencentcloud-cos

Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WP FEvents Book

Vulnerability
Insecure Direct Object References (IDOR)
Patched in Version
No Fix
CVE
2023-1129
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

IMPress Listings

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Patched in Version
No Fix
CVE
2023-1865
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-1866
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-1867
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Patched in Version
No Fix
CVE
2023-1868
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-1869
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-1870
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

YourChannel

Plugin
YourChannel: Everything you want in a YouTube
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-1871
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you will need to find an alternative theme. Deactivate and delete persistently unpatched themes and those that have been “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, simply delete it.

Weaver Xtreme Theme

Product image for Weaver Xtreme.

Vulnerability
Authenticated(Contributor+) Stored Cross-Site Scripting via Display Name
CVE
2023-1403
The vulnerability has been patched, so you should update to version 6.2.

The7

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 11.6.1.

Houzez

The vulnerability has been patched, so you should update to version 2.8.3.

Outdoor

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.9.7.

TheRoof

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.0.4.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – April 12, 2023 appeared first on iThemes.

This content was originally published here.