WordPress Vulnerability Report – March 29, 2023


Warning: getimagesize(https://ps.w.org/woocommerce-payments/assets/banner-1544x500.png?rev=2429229): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/filebird/assets/banner-1544x500.png?rev=2350008): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/give/assets/banner-1544x500.jpg?rev=2873287): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/popup-anything-on-click/assets/banner-772x250.png?rev=2877797): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gallery-plugin/assets/banner-1544x500.jpg?rev=2262507): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/advanced-page-visit-counter/assets/banner-1544x500.png?rev=2532507): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/nex-forms-express-wp-form-builder/assets/banner-1544x500.png?rev=2260980): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/th-advance-product-search/assets/banner-772x250.png?rev=2600967): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/th-all-in-one-woo-cart/assets/banner-772x250.png?rev=2652047): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/pagination/assets/banner-1544x500.jpg?rev=2287323): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/th-variation-swatches/assets/banner-772x250.png?rev=2569743): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-thank-you-page-customizer/assets/banner-1544x500.jpg?rev=2617298): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gs-pinterest-portfolio/assets/banner-772x250.png?rev=2274331): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/continuous-image-carousel-with-lightbox/assets/banner-772x250.png?rev=1211065): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/cbcurrencyconverter/assets/banner-1544x500.png?rev=2267703): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/contact-forms/assets/banner-1544x500.png?rev=752532): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/contest-gallery/assets/banner-772x250.jpg?rev=2679591): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-politic/assets/banner-772x250.png?rev=1975851): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/99fy-core/assets/banner-772x250.jpg?rev=2875674): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-film-studio/assets/banner-772x250.png?rev=1947997): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-news-magazine/assets/banner-772x250.png?rev=2010507): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/quickswish/assets/banner-1544x500.jpg?rev=2519552): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-education/assets/banner-772x250.png?rev=1984331): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ht-event/assets/banner-772x250.png?rev=1972344): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-insurance/assets/banner-772x250.png?rev=1952023): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-shamsi/assets/banner-1544x500.png?rev=2459107): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/fuse-social-floating-sidebar/assets/banner-1544x500.png?rev=2557504): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/eroom-zoom-meetings-webinar/assets/banner-1544x500.png?rev=2284794): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-product-carousel-slider-and-grid-ultimate/assets/banner-1544x500.jpg?rev=2812931): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/i-recommend-this/assets/banner-772x250.jpg?rev=1307381): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/worth-the-read/assets/banner-772x250.png?rev=1466470): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/owl-carousel/assets/banner-772x250.png?rev=1434595): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/easy-media-replace/assets/banner-1544x500.png?rev=2010121): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/full-width-responsive-slider-wp/assets/banner-772x250.png?rev=1784176): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gs-pinterest-portfolio/assets/banner-772x250.png?rev=2274331): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/amr-users/assets/banner-772x250.jpg?rev=559374): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/bp-activity-social-share/assets/banner-772x250.jpg?rev=1758180): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ip-address-blocker/assets/banner-772x250.png?rev=712006): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/tx-onepager/assets/banner-1544x500.jpg?rev=2023659): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/schedulicity-online-appointment-booking/assets/banner-772x250.jpg?rev=2223253): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-image-carousel/assets/banner-772x250.png?rev=669299): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/woo-custom-checkout-fields/assets/banner-772x250.png?rev=1673131): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/export-users-data-distinct/assets/banner-772x250.png?rev=2701638): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ts.w.org/wp-content/themes/resoto/screenshot.png?ver=1.0.8): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

This week, the total patched and unpatched vulnerabilities may impact well over 8 million WordPress sites. There are 58 plugin vulnerabilities with security patches available, so run those updates if you use these plugins! Additionally, there are 25 plugin vulnerabilities and 1 theme vulnerability with no patch available yet. If you use any of these unpatched plugins or themes, check their vendors’ intentions and progress on a security release. If no patch is forthcoming or a vulnerable plugin or theme has been “closed” (dropped from the WordPress.org repository), you should consider deactivating it in favor of alternative solutions.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins that have not been updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new WordPress plugin, theme, and core vulnerabilities that have emerged since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you are using vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

The Future of Authentication is Passkeys! Log into your WordPress site with Biometrics only available in iThemes Security Pro.

Credential stuffing, phishing, and brute force attacks using stolen, guessable, or reused passwords have made our digital lives less secure. Two-Factor Authentication (2FA) offers some protection but at the cost of usability and accessibility. Fewer than 30% of all online account holders actually use 2FA. Password-based logins are broken.

The future of authentication is passkeys, and iThemes Security Pro is the first to bring this breakthrough technology to WordPress sites. Using breakthrough WebAuthn technology based on public/private cryptography, passkeys make passwords obsolete. Now, website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

WordPress Core News

WordPress 6.1.1 is the current (short-cycle maintenance) release of WordPress core. It is a minor release issued on November 15, 2022. It features 29 bug fixes in Core and 21 bug fixes for the Gutenberg block editor. You can review a summary of the key updates in this release at WordPress.org.

If your WordPress sites have enabled automatic background updates, they should have upgraded to 6.1.1 automatically. You can download WordPress 6.1.1 from WordPress.org, or visit your WordPress Dashboard, click “Updates,” and then click the “Update Now” button, which will appear when any core updates are available. For more information, check out the version 6.1.1 HelpHub documentation page.

WordPress 6.2 is the next major WordPress release, and it’s on track for a March 29, 2023 debut today after a brief, one-day delay. As of this writing, it has not been released yet. You can learn more about what’s coming in the WordPress 6.2 RC1 release announcement and the WordPress 6.2 Field Guide, as well as our post on the upcoming features for WordPress 6.2.

WordPress Plugin Vulnerabilities with Patches

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities that have been fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, which represent the largest target for attackers.

WordPress LiteSpeed Cache

Product image for LiteSpeed Cache.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 5.3.1.

WordPress IThemes Security

Product image for iThemes Security.

Vulnerability
Open Redirection via Host header
The vulnerability has been patched, so you should update to version 8.1.5.

WordPress Save SVG

Product image for Safe SVG.

Plugin
Safe SVG
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.1.0.

WordPress WP Statistics

Product image for WP Statistics.

Plugin
WP Statistics
CVE
2023-0955
The vulnerability has been patched, so you should update to version 13.2.11.

WordPress Simple Author Box

Product image for Simple Author Box.

Vulnerability
Cross-Site Request Forgery via save_user_profile
The vulnerability has been patched, so you should update to version 2.51.

WordPress Maps Widget for Google Maps

Product image for Maps Widget for Google Maps.

Vulnerability
Cross-Site Request Forgery via dismiss_notice
The vulnerability has been patched, so you should update to version 4.24.

WordPress Visibility Logic for Elementor

Product image for Visibility Logic for Elementor.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.3.4.

WordPress Quick Paypal Payments

Vulnerability
Authenticated (Administrator+) Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 5.7.26.4.

WordPress Albo Pretorio On line

Product image for Albo Pretorio On line.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.6.1.

WordPress CBX Currency Converter

Product image for CBX Currency Converter.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 3.0.4.

WordPress Contact Forms by Cimatti

Product image for WordPress Contact Forms by Cimatti.

Vulnerability
Unauth. Stored Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.5.5.

WordPress Stock Sync for WooCommerce

Product image for Stock Sync for WooCommerce.

Vulnerability
Broken Access Control + CSRF
The vulnerability has been patched, so you should update to version 2.4.0.

WordPress Free WooCommerce Theme 99fy Extension

Product image for Free WooCommerce Theme 99fy Extension.

Vulnerability
Arbitrary Plugin Activation via CSRF
CVE
2023-0503
The vulnerability has been patched, so you should update to version 1.2.8.

WordPress Complianz – GDPR/CCPA Cookie Consent

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-1069
The vulnerability has been patched, so you should update to version 6.4.2.

WordPress directory-pro

The vulnerability has been patched, so you should update to version 1.9.5.

WordPress doctor-listing

The vulnerability has been patched, so you should update to version 1.3.6.

WordPress Elementor Pro

The vulnerability has been patched, so you should update to version 3.11.7.

WordPress final-user-wp-frontend-user-profiles

The vulnerability has been patched, so you should update to version 1.2.2.

WordPress fitness-trainer

The vulnerability has been patched, so you should update to version 1.4.1.

WordPress hotel-listing

The vulnerability has been patched, so you should update to version 1.3.7.

WordPress institutions-directory

The vulnerability has been patched, so you should update to version 1.3.1.

WordPress lawyer-directory

The vulnerability has been patched, so you should update to version 1.2.9.

WordPress OAuth Single Sign On – SSO (OAuth Client) Premium plugin

Plugin
OAuth Single Sign On – SSO (OAuth Client) Premium
Vulnerability
Cross Site Request Forgery (CSRF)
CVE
2023-1092
The vulnerability has been patched, so you should update to version 48.4.9.

WordPress Slider, Gallery, and Carousel by MetaSlider

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.29.1.

WordPress photographer-directory

The vulnerability has been patched, so you should update to version 1.0.9.

WordPress real-estate-pro

The vulnerability has been patched, so you should update to version 1.7.1.

WordPress WC Fields Factory

The vulnerability has been patched, so you should update to version 4.1.6.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

WordPress Product Feed PRO for WooCommerce

Product image for Product Feed PRO for WooCommerce.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Fuse Social Floating Sidebar

Product image for Fuse Social Floating Sidebar.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress I Recommend This

Product image for I Recommend This.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Worth The Read

Product image for Worth The Read.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Owl Carousel

Product image for Owl Carousel.

Plugin
Owl Carousel
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Easy Media Replace

Product image for Easy Media Replace.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Full Width Banner Slider Wp

Product image for Full Width Banner Slider Wp.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress amr users

Product image for amr users.

Plugin
amr users
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress LionScripts: IP Blocker Lite

Product image for LionScripts: IP Blocker Lite.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress WooCommerce JazzCash Gateway Plugin

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Review Stream

Plugin
Review Stream
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress WP Image Carousel

Product image for WP Image Carousel.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-0589
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Export Users Data Distinct

Product image for Export Users Data Distinct.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Product Specifications for WooCommerce

Plugin
Product Specifications for Woocommerce
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you will need to find an alternative theme. Deactivate and delete persistently unpatched themes and those that have been “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, simply delete it.

WordPress Resoto

Product image for Resoto.

Theme
Resoto
Patched in Version
No Fix
The vulnerability has not been patched. You should switch themes.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – March 29, 2023 appeared first on iThemes.

This content was originally published here.