WordPress Vulnerability Report – July 19, 2023


Warning: getimagesize(https://ps.w.org/ultimate-addons-for-gutenberg/assets/banner-1544x500.jpg?rev=2853008): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/fluentform/assets/banner-1544x500.jpg?rev=2930414): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ht-mega-for-elementor/assets/banner-772x250.png?rev=2924556): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woocommerce-ajax-filters/assets/banner-1544x500.gif?rev=2770304): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/yet-another-stars-rating/assets/banner-1544x500.png?rev=1110716): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-product-variation-swatches/assets/banner-1544x500.png?rev=2624381): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/zippy/assets/banner-772x250.jpg?rev=2313093): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-product-variation-gallery/assets/banner-1544x500.png?rev=2627238): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woocommerce-product-stock-alert/assets/banner-772x250.jpg?rev=2371395): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/anspress-question-answer/assets/banner-1544x500.png?rev=2414999): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpfunnels/assets/banner-1544X500.gif?rev=2845863): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/authors-list/assets/banner-772x250.png?rev=2062262): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/cf7-salesforce/assets/banner-1544x500.png?rev=2609799): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gift-voucher/assets/banner-1544x500.png?rev=2433077): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/kb-support/assets/banner-1544x500.jpg?rev=2937413): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/shorten-url/assets/banner-1544x500.png?rev=885868): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/stax-buddy-builder/assets/banner-1544x500.png?rev=2534986): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/custom-field-for-wp-job-manager/assets/banner-1544x500.png?rev=2161810): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/directorypress/assets/banner-772x250.png?rev=2805329): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/falang/assets/banner-1544x500.png?rev=2410977): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/cc-coming-soon/assets/banner-772x250.png?rev=1139262): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/sliderspack-all-in-one-image-sliders/assets/banner-1544x500.png?rev=2584879): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/exit-intent-popups-by-optimonk/assets/banner-772x250.png?rev=2934482): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/easyship-woocommerce-shipping-rates/assets/banner-1544x500.png?rev=2217347): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpschoolpress/assets/banner-1544x500.jpg?rev=2004625): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/aws-cdn-by-wpadmin/assets/banner-1544x500.jpg?rev=2647571): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/contact-form-generator/assets/banner-772x250.png?rev=1100760): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/contact-form-to-any-api/assets/banner-1544x500.png?rev=2752953): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/shortcode-imdb/assets/banner-1544x500.png?rev=2566794): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/radio-forge/assets/banner-772x250.png?rev=981104): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/replace-word/assets/banner-772x250.png?rev=1262188): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpbulky-wp-bulk-edit-post-types/assets/banner-1544x500.jpg?rev=2610661): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/shopconstruct/assets/banner-772x250.jpg?rev=1884874): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/twittee-text-tweet/assets/banner-1544x500.png?rev=909789): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/pdq-csv/assets/banner-1544x500.jpg?rev=2671782): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-default-feature-image/assets/banner-772x250.png?rev=1809371): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Since last week, 80 total vulnerabilities emerged in public disclosure. They may affect over 5 million WordPress sites. There are 55 plugin vulnerabilities with security patches available, so run those updates!

Additionally, there are 23 plugin vulnerabilities and two theme vulnerabilities with no patch available yet. If you discover you are using an unpatched plugin or theme, check their vendors’ intentions and progress on a security release. If no patch is forthcoming or the vulnerable software has been marked “closed” and dropped from the official WordPress and repositories, you should consider deactivation and removal in favor of alternative solutions.

Solid Security: The Next Chapter in WordPress Protection

As you know, we’re rebranding publicly, and iThemes is becoming SolidWP. This transition includes new and enhanced features plus a complete interface redesign for our products. In this webinar, our lead developer, Timothy Jacobs, demonstrates the new features coming to Solid Security — formerly known as iThemes Security.

In the video, you’ll get a tour of:

  • the improved dashboard
  • passkeys and the passwordless login experience
  • the all-new firewall
  • virtual patches that protect you when you need them most

Nathan Ingram hosted this sneak preview of the all-new Solid Security. He fielded many terrific questions from the live audience for Timothy and Matt Cromwell, our Senior Director of Customer Experience at StellarWP, so check out that discussion in the last 30 minutes.

News From WordPress

WordPress 6.3 RC1 is ready for download and testing. Because this version is under development, do not install, run, or test this version on production or mission-critical websites. Instead, evaluate RC1 on a test server and site.

WordPress Core Vulnerabilities — Patched

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins that have not been updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new WordPress plugin, theme, and core vulnerabilities that have emerged since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you are using vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

These reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.

WordPress Plugin Vulnerabilities — Patched

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities that have been fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity, thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, which represent the largest target for attackers.

Rank Math SEO

Product image for Rank Math SEO.

Plugin
Rank Math SEO
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.0.119.1.
Vulnerability
Authenticated (Contributor+) Stored Cross Site Scripting (XSS)
CVE
2023-2433
The vulnerability has been patched, so you should update to version 5.30.4.

kk Star Ratings

Product image for kk Star Ratings.

Vulnerability
Rate Manipulation due to IP Spoofing
The vulnerability has been patched, so you should update to version 5.4.4.

Media Library Assistant

Product image for Media Library Assistant.

Vulnerability
Reflected Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.0.8.

HTTP Headers

Product image for HTTP Headers.

Plugin
HTTP Headers
Vulnerability
Server Side Request Forgery (SSRF)
The vulnerability has been patched, so you should update to version 1.19.0.

HTTP Headers

Product image for HTTP Headers.

Plugin
HTTP Headers
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.19.0.

Super Socializer

Product image for Social Share, Social Login and Social Comments Plugin – Super Socializer.

Vulnerability
Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
The vulnerability has been patched, so you should update to version 7.13.54.

Booking Package SAASPROJECT

Product image for Booking Package.

The vulnerability has been patched, so you should update to version 1.5.99.

Zippy

Product image for Zippy.

Plugin
Zippy
The vulnerability has been patched, so you should update to version 1.6.3.

Authors List

Product image for Authors List.

Plugin
Authors List
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.0.3.

Short URL

Product image for Short URL.

Plugin
Short URL
Vulnerability
Cross Site Scripting (XSS)
CVE
2023-3130
The vulnerability has been patched, so you should update to version 1.6.5.

MF Gig Calendar

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.2.1.

WP Social AutoConnect

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 4.6.2.

MailArchiver

Plugin
MailArchiver
Vulnerability
Unauthenticated Stored Cross-Site Scripting via Email Subject
CVE
2023-3136
The vulnerability has been patched, so you should update to version 2.11.0.

CartFlows Pro

Vulnerability
Reflected Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.11.12.

Grid Kit Premium

Vulnerability
Multiple Reflected Cross Site Scripting (XSS)
CVE
2023-3292
The vulnerability has been patched, so you should update to version 2.2.0.

Premium Addons PRO

The vulnerability has been patched, so you should update to version 2.9.1.

Premium Addons PRO

The vulnerability has been patched, so you should update to version 2.9.1.

WooCommerce GoCardless Gateway

Vulnerability
Unauth. Insecure Direct Object References (IDOR)
The vulnerability has been patched, so you should update to version 2.5.7.

WooCommerce Ship to Multiple Addresses

Plugin
WooCommerce Ship to Multiple Addresses
Vulnerability
Reflected Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.8.6.

WooCommerce Ship to Multiple Addresses

Plugin
WooCommerce Ship to Multiple Addresses
The vulnerability has been patched, so you should update to version 3.8.6.

WooCommerce Warranty Requests

The vulnerability has been patched, so you should update to version 2.2.0.

WordPress Plugin Vulnerabilities — Unpatched

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

Chat Button

Product image for Chat Button by GetButton.io.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Coming Soon Chop Chop

Product image for Coming Soon Chop Chop.

Vulnerability
Reflected Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Social Media Icons Widget

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WPAdmin AWS CDN

Product image for WPAdmin AWS CDN.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Contact Form to Any API

Product image for Contact Form to Any API.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Shortcode IMDB

Product image for Shortcode IMDB.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Radio Forge Muses Player with Skins

Product image for Radio Forge Muses Player with Skins.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Replace Word

Product image for Replace Word.

Plugin
Replace Word
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Art Direction

Plugin
Art Direction
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Dovetail

Plugin
Dovetail
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Twittee Text Tweet

Product image for Twittee Text Tweet.

Vulnerability
Reflected Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-0602
The vulnerability has not been patched. You should deactivate the plugin.

Mail Control

Vulnerability
Unauthenticated Stored Cross Site Scripting (XSS) via Email Subject
Patched in Version
No Fix
CVE
2023-3158
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

PDQ CSV

Product image for PDQ CSV.

Plugin
PDQ CSV
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WP Default Feature Image

Product image for WP Default Feature Image.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you will need to find an alternative theme. Deactivate and delete persistently unpatched themes and those that have been “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, simply delete it.

RealHomes

Patched in Version
No Fix
The vulnerability has not been patched. You should switch themes.

RealHomes

Patched in Version
No Fix
The vulnerability has not been patched. You should switch themes.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – July 19, 2023 appeared first on iThemes.

This content was originally published here.