WordPress Vulnerability Report – August 10, 2022


Warning: getimagesize(https://ps.w.org/mailchimp-for-woocommerce/assets/banner-1544x500.png?rev=1950415): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/string-locator/assets/banner-1544x500.png?rev=928605): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ecwid-shopping-cart/assets/banner-1544x500.png?rev=2746361): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/leaflet-maps-marker/assets/banner-772x250.jpg?rev=879685): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/sensei-lms/assets/banner-1544x500.png?rev=2531152): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/simply-schedule-appointments/assets/banner-1544x500.png?rev=1879632): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/fluent-support/assets/banner-1544x500.png?rev=2628677): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

Addressing the SVG XSS Vulnerability in Gutenberg

As reported by Patchstack, an SVG XSS vulnerability was reported in Gutenberg this week. We stand with Patchstack in why you shouldn’t worry about this. Here is a quote from iThemes Security Lead Developer Timothy Jacobs: “The Gutenberg vulnerability is not an issue to worry about. I recommend always keeping in mind that if you’re including content from other people’s websites, that content can change at any time. It’s best to host your images on your own website or a CDN you control.”

WordPress Core Vulnerabilities

WordPress 6.0.1 was released on July 12, 2022, as a short-cycle maintenance release with 31 bug fixes. Because this is a core update, be sure to update to WordPress 6.0.1 as soon as possible.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

MailChimp for Woocommerce

Product image for Mailchimp for WooCommerce.

The vulnerability has been patched, so you should update to version 2.7.1.

Download Manager

Product image for Download Manager.

Vulnerability
Contributor+ Arbitrary File Deletion; Unauthenticated Reflected Cross-Site Scripting
The vulnerability has been patched, so you should update to version 3.2.51.

String Locator

Product image for String locator.

The vulnerability has been patched, so you should update to version 2.6.0.

Social Slider Feed

Product image for Social Slider Feed.

Vulnerability
Admin+ Stored XSS via API Key
The vulnerability has been patched, so you should update to version 2.0.6.

WP Hide & Security Enhancer

Product image for WP Hide & Security Enhancer.

The vulnerability has been patched, so you should update to version 1.8.

Export All URLs

Product image for Export All URLs.

Vulnerability
Admin+ Arbitrary System File Removal
The vulnerability has been patched, so you should update to version 4.4.

Ecwid Ecommerce Shopping Cart

Product image for Ecwid Ecommerce Shopping Cart.

Vulnerability
Settings Update via CSRF
The vulnerability has been patched, so you should update to version 6.10.24.

Sensei LMS

Product image for Sensei LMS – Online Courses, Quizzes, & Learning.

Vulnerability
Arbitrary Private Message Sending via IDOR; Unauthenticated Private Messages Disclosure via Rest API
The vulnerability has been patched, so you should update to version 4.5.2.

Affiliate For WooCommerce

The vulnerability has been patched, so you should update to version 4.8.0.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

uContext for Amazon

Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Banner Cycler

Plugin
Banner Cycler
Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Link Optimizer Lite

Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

uContext for Clickbank

Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

ActiveDEMAND plugin

Plugin
ActiveDEMAND
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

  • Good news! No new WordPress theme vulnerabilities were disclosed this week.

Sneak Peek: Biometric Logins + Passkeys are Coming

See a live demo TODAY, August 10, 2022 @ 1:00 p.m. (CT)

The easiest and most secure way to log in to your WordPress site is coming! In the next major release, iThemes Security will add biometric logins (like Face ID, Touch ID, and Windows Hello) and passkey technology supported by all major browsers, including Chrome, Firefox, and Safari. Now website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

Powered by the WebAuthn protocol, these login methods provide an innovative passwordless login experience that is the future for securing sensitive information online, including logging in to any WordPress site. As the future of logins for all sites and apps, iThemes Security is the first to bring it to WordPress as the primary login method.

Can’t make the live call? Go ahead and register and we’ll email you the video replay.
See time in your time zone.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, lots of new WordPress plugin and theme vulnerabilities are disclosed each week. We know it can be difficult to stay on top of every reported vulnerability disclosure, so the iThemes Security Pro plugin makes it easy to make sure your site isn’t running a theme, plugin, or WordPress core version with a known vulnerability.

Scans Your Website Twice a Day for Vulnerabilities

Your website’s plugins, themes, and WordPress core versions are checked against the WPScan Vulnerability Database for the latest vulnerability disclosures.

Automatically Updates if a Security Fix is Available

Paired with Version Management, iThemes Security will automatically update a plugin, theme, or WordPress core version if it has a vulnerability.

Emails You if Site Scan Detects a Vulnerability

You can receive an email report if your site is running vulnerable versions of a plugin, theme, or WordPress core. Customize the email addresses that receive scan results.

The Best WordPress Security Plugin to Secure & Protect WordPress Sites

WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. The iThemes Security Pro plugin takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. It’s like having a full-time security expert on staff who constantly monitors and protects your WordPress site for you.

The post WordPress Vulnerability Report – August 10, 2022 appeared first on iThemes.

This content was originally published here.