WordPress Vulnerability Report – April 5, 2023


Warning: getimagesize(https://ps.w.org/woo-advanced-shipment-tracking/assets/banner-772x250.png?rev=2606228): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/google-maps-widget/assets/banner-1544x500.png?rev=2136987): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/popup-anything-on-click/assets/banner-772x250.png?rev=2877797): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gallery-plugin/assets/banner-1544x500.jpg?rev=2262507): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/add-to-cart-direct-checkout-for-woocommerce/assets/banner-1544x500.png?rev=2469900): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/affiliates-manager/assets/banner-772x250.jpg?rev=926960): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/masterstudy-lms-learning-management-system/assets/banner-1544x500.jpg?rev=2364576): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-ultimate-review/assets/banner-1544x500.png?rev=2544187): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/zippy/assets/banner-772x250.jpg?rev=2313093): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-easycart/assets/banner-1544x500.png?rev=1961544): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpappninja/assets/banner-772x250.png?rev=2510920): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/tf-numbers-number-counter-animaton/assets/banner-772x250.gif?rev=2509031): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-trending-post-slider-and-widget/assets/banner-772x250.png?rev=2585862): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/full-width-responsive-slider-wp/assets/banner-772x250.png?rev=1784176): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-coupon-usage/assets/banner-772x250.png?rev=2539488): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/affiliate-toolkit-starter/assets/banner-772x250.png?rev=2841889): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/conditional-extra-fees-for-woocommerce/assets/banner-1544x500.png?rev=2653564): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/enquiry-quotation-for-woocommerce/assets/banner-1544x500.png?rev=2473015): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/pi-woocommerce-order-date-time-and-type/assets/banner-1544x500.jpg?rev=2472772): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wishsuite/assets/banner-772x250.jpg?rev=2880939): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-copysafe-web/assets/banner-772x250.jpg?rev=2197021): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ht-builder/assets/banner-772x250.jpg?rev=2875683): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/mobile-banner/assets/banner-1544x500.png?rev=2079398): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/n-media-wp-simple-quiz/assets/banner-772x250.png?rev=2863582): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/intelly-welcome-bar/assets/banner-1544x500.png?rev=1329684): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/swatchly/assets/banner-1544x500.jpg?rev=2893238): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/easy-media-replace/assets/banner-1544x500.png?rev=2010121): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ht-menu-lite/assets/banner-772x250.jpg?rev=2120012): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/just-tables/assets/banner-772x250.jpg?rev=2469966): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ip-address-blocker/assets/banner-772x250.png?rev=712006): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/really-simple-google-tag-manager/assets/banner-772x250.png?rev=2439494): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/social-proof-testimonials-slider/assets/banner-772x250.png?rev=1600812): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/premmerce-redirect-manager/assets/banner-1544x500.png?rev=1929187): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-custom-checkout-fields/assets/banner-772x250.png?rev=1673131): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/solidres/assets/banner-1544x500.png?rev=1118630): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ts.w.org/wp-content/themes/viral-mag/screenshot.png?ver=2.0.26): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

This week, the total number of patched and unpatched vulnerabilities is low but still may affect over 3.5 million WordPress sites. There are 51 plugin vulnerabilities and one theme with security patches available, so run those updates if you use these plugins! Additionally, there are 16 plugin vulnerabilities with no patch available yet. Three of these have been closed and dropped from the wordpress.org plugin directory. If you use any unpatched plugins or themes, check their vendors’ intentions and progress on a security release. If no patch is forthcoming or the vulnerable plugin or theme has been closed, you should consider deactivation and removal in favor of alternative solutions.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins that have not been updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new WordPress plugin, theme, and core vulnerabilities that have emerged since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you are using vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

WordPress Core News

WordPress 6.2 is the first major release of 2023, with over 900 enhancements and fixes. You’ll notice a reimagined Site Editor, blocks get even better, and new tools and improvements in WordPress 6.2. As always, with a major release like this, ensure your site is backed up with BackupBuddy before updating.

If your WordPress sites have enabled automatic background updates, they should have upgraded to 6.2 automatically. You can download WordPress 6.2 from WordPress.org, or visit your WordPress Dashboard, click “Updates,” and then click the “Update Now” button, which will appear when any core updates are available. For more information, check out the version 6.2 HelpHub documentation page.

WordPress Plugin Vulnerabilities with Patches

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities that have been fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, which represent the largest target for attackers.

Custom Post Type UI

Product image for Custom Post Type UI.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.13.5.

Happy Addons for Elementor

Product image for Happy Addons for Elementor.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 3.8.3.

Simple Author Box

Product image for Simple Author Box.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.51.

Maps Widget for Google Maps

Product image for Maps Widget for Google Maps.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 4.24.

WP Meta SEO

Product image for WP Meta SEO.

Plugin
WP Meta SEO
Vulnerability
Deserialization of untrusted data
CVE
2023-1381
The vulnerability has been patched, so you should update to version 4.5.5.

Affiliates Manager

Product image for Affiliates Manager.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.9.21.

WP Ultimate Review

Product image for Wp Ultimate Review.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.1.0.

WP Ultimate Review

Product image for Wp Ultimate Review.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.1.0.

Zippy

Product image for Zippy.

Plugin
Zippy
The vulnerability has been patched, so you should update to version 1.6.2.

Magic Post Thumbnail

Product image for Magic Post Thumbnail.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.1.11.

Configurable Tag Cloud

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 5.3.

ChatBot

Product image for AI ChatBot.

Plugin
AI ChatBot
The vulnerability has been patched, so you should update to version 4.4.8.

Full Width Banner Slider

Product image for Full Width Banner Slider Wp.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.1.8.

Quick Paypal Payments

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 5.7.26.4.

PropertyHive

Product image for PropertyHive.

Plugin
PropertyHive
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.5.47.

Albo Pretorio On line

Product image for Albo Pretorio On line.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.6.2.

CopySafe Web Protection

Product image for CopySafe Web Protection.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.14.

SMTP Mailing Queue

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.0.0.

Mobile Banner

Product image for Mobile Banner.

Plugin
Mobile Banner
Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.6.

Easy Quiz Maker

Product image for Easy Quiz Maker.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.0.

Welcome Bar

Product image for Welcome Bar.

Plugin
Welcome Bar
Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.0.4.

Welcome Bar

Product image for Welcome Bar.

Plugin
Welcome Bar
The vulnerability has been patched, so you should update to version 2.0.4.

Add User Role

Vulnerability
Cross Site Request Forgery (CSRF)
CVE
2023-0820
The vulnerability has been patched, so you should update to version 1.6.7.

Enhanced WP Contact Form

Plugin
Enhanced WP Contact Form
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.3.

HappyFiles Pro

The vulnerability has been patched, so you should update to version 1.8.2.

HappyFiles Pro

The vulnerability has been patched, so you should update to version 1.8.2.

Image Over Image For WPBakery Page Builder

Plugin
Image Over Image For WPBakery Page Builder
Vulnerability
Cross Site Scripting (XSS)
CVE
2023-0399
The vulnerability has been patched, so you should update to version 3.0.

WC Fields Factory

The vulnerability has been patched, so you should update to version 4.1.6.

Slimstat Analytics

The vulnerability has been patched, so you should update to version 4.9.3.4.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

PixFields

Plugin
PixFields
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Easy Media Replace

Product image for Easy Media Replace.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

JustTables – WooCommerce Product Table

Product image for JustTables – WooCommerce Product Table.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

LionScripts: IP Blocker Lite

Product image for LionScripts: IP Blocker Lite.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Really Simple Google Tag Manager

Product image for Really Simple Google Tag Manager.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Social Proof (Testimonial) Slider

Product image for Social Proof (Testimonial) Slider.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Premmerce Redirect Manager

Product image for Premmerce Redirect Manager.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Premmerce Redirect Manager

Product image for Premmerce Redirect Manager.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Gift Cards (Gift Vouchers and Packages) for WooCommerce

Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Product Specifications for WooCommerce

Plugin
Product Specifications for Woocommerce
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WC Fields Factory

Patched in Version
No Fix
CVE
2023-0277
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you will need to find an alternative theme. Deactivate and delete persistently unpatched themes and those that have been “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, simply delete it.

Viral Mag

Product image for Viral Mag.

Theme
Viral Mag
The vulnerability has been patched, so you should update to version 1.1.0.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – April 5, 2023 appeared first on iThemes.

This content was originally published here.