WordPress Vulnerability Report – July 6, 2022


Warning: getimagesize(https://ps.w.org/unyson/assets/banner-1544x500.png?rev=1034271): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wordpress-popular-posts/assets/banner-772x250.png?rev=2179381): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/add-search-to-menu/assets/banner-1544x500.png?rev=2077748): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/social-networks-auto-poster-facebook-twitter-g/assets/banner-772x250.png?rev=2667544): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-video-lightbox/assets/banner-772x250.png?rev=1803645): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/popup-anything-on-click/assets/banner-772x250.png?rev=2709753): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/shareaholic/assets/banner-1544x500.png?rev=2703458): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/advanced-wp-reset/assets/banner-772x250.png?rev=2683723): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/sp-client-document-manager/assets/banner-772x250.png?rev=944546): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/login-with-phone-number/assets/banner-1544x500.jpg?rev=2354043): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities, and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

WordPress Core Vulnerabilities

WordPress 6.0 “Arturo” was released on May 24, 2022. This major version release of WordPress was “built to help you unlock your creative aspirations and make your site-building experience more intuitive,” including almost 1,000 enhancements and bug fixes. See what’s new in WordPress 6.0.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

Header Footer Code Manager

Product image for Header Footer Code Manager.

The vulnerability has been patched, so you should update to version 1.1.24.

Unyson

Product image for Unyson.

Plugin
Unyson
The vulnerability has been patched, so you should update to version 2.7.27.

WordPress Popular Posts

Product image for WordPress Popular Posts.

The vulnerability has been patched, so you should update to version 6.0.0.

Custom Product Tabs for WooCommerce

Product image for Custom Product Tabs for WooCommerce.

Vulnerability
Unauthenticated Toggle Content Setting Update
The vulnerability has been patched, so you should update to version 1.7.8.

Booster for WooCommerce

Product image for Booster for WooCommerce.

The vulnerability has been patched, so you should update to version 5.6.0.

WP Video Lightbox

Product image for WP Video Lightbox.

Vulnerability
Admin+ Stored Cross-Site Scripting; Reflected Cross-Site Scripting
The vulnerability has been patched, so you should update to version 1.9.6.

Shareaholic

Product image for Professional Social Sharing Buttons, Icons & Related Posts – Shareaholic.

The vulnerability has been patched, so you should update to version 9.7.6.

Advanced WordPress Reset

Product image for Advanced WordPress Reset.

The vulnerability has been patched, so you should update to version 1.6.

Name Directory

Product image for Name Directory.

Vulnerability
Reflected Cross-Site Scripting; Arbitrary Directory/Name Deletion via CSRF; Stored Cross-Site Scripting via CSRF
The vulnerability has been patched, so you should update to version 1.25.3.

Exports and Reports

The vulnerability has been patched, so you should update to version 0.9.2.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

SP Project & Document Manager

Product image for SP Project & Document Manager.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Login with phone number

Product image for Login with phone number.

Vulnerability
multiple Admin+ Stored XSS
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Request a Quote

Vulnerability
Admin+ Stored Cross-Site Scripting; CSV Injection
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Image Slider

Plugin
Image Slider
Vulnerability
Arbitrary Post Duplication via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

FreeMind WP Browser

Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Gallery for Social Photo

Vulnerability
Arbitrary Post Duplication via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Allow SVG Files

Vulnerability
Author+ Stored Cross Site Scripting via SVG
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Popup

Vulnerability
Admin+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Invitation Based Registrations

Vulnerability
Admin+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

AnyMind Widget

Vulnerability
Stored Cross-Site Scripting via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

  • Good news! No new WordPress theme vulnerabilities were disclosed this week.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, lots of new WordPress plugin and theme vulnerabilities are disclosed each week. We know it can be difficult to stay on top of every reported vulnerability disclosure, so the iThemes Security Pro plugin makes it easy to make sure your site isn’t running a theme, plugin, or WordPress core version with a known vulnerability.

Scans Your Website Twice a Day for Vulnerabilities

Your website’s plugins, themes, and WordPress core versions are checked against the WPScan Vulnerability Database for the latest vulnerability disclosures.

Automatically Updates if a Security Fix is Available

Paired with Version Management, iThemes Security will automatically update a plugin, theme, or WordPress core version if it has a vulnerability.

Emails You if Site Scan Detects a Vulnerability

You can receive an email report if your site is running vulnerable versions of a plugin, theme, or WordPress core. Customize the email addresses that receive scan results.

The Best WordPress Security Plugin to Secure & Protect WordPress Sites

WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. The iThemes Security Pro plugin takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. It’s like having a full-time security expert on staff who constantly monitors and protects your WordPress site for you.

The post WordPress Vulnerability Report – July 6, 2022 appeared first on iThemes.

This content was originally published here.