WordPress Vulnerability Report – May 10, 2023


Warning: getimagesize(https://ps.w.org/image-optimizer-wd/assets/banner-772x250.png?rev=1736250): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/participants-database/assets/banner-1544x500.jpg?rev=1494923): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/url-params/assets/banner-772x250.png?rev=499995): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/product-catalog-feed/assets/banner-772x250.jpg?rev=2141969): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/holler-box/assets/banner-1544x500.png?rev=2753148): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/ko-fi-button/assets/banner-1544x500.png?rev=2314212): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/mail-integration-365/assets/banner-1544x500.png?rev=2429780): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/stagtools/assets/banner-1544x500.jpg?rev=854668): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-easy-pay/assets/banner-1544x500.png?rev=2262478): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/tk-google-fonts/assets/banner-1544x500.png?rev=1371354): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpdirectorykit/assets/banner-772x250.jpg?rev=2607747): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/gallery-photo-gallery/assets/banner-1544x500.png?rev=2452024): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/tp-education/assets/banner-772x250.jpg?rev=1523674): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-docs/assets/banner-1544x500.png?rev=2539073): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wppizza/assets/banner-772x250.png?rev=2312623): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/library-viewer/assets/banner-1544x500.jpg?rev=2120573): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/hostel/assets/banner-1544x500.png?rev=2508198): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/easy-appointments/assets/banner-1544x500.png?rev=2169533): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/peepso-core/assets/banner-1544x500.png?rev=2739597): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/multi-rating/assets/banner-772x250.png?rev=1509324): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/booking-ultra-pro/assets/banner-1544x500.png?rev=2648370): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/rest-api-to-miniprogram/assets/banner-1544x500.jpg?rev=2469338): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/manager-for-icomoon/assets/banner-1544x500.png?rev=2486489): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-abstracts-manuscripts-manager/assets/banner-772x250.jpg?rev=929984): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

This week, 66 vulnerabilities may affect over 5.8 million WordPress sites. There are 42 plugin vulnerabilities and five in themes that have security patches available, so run those updates! Additionally, there are 18 plugin vulnerabilities and one theme with no patch available yet. If you are using any unpatched plugins or themes, check their vendors’ intentions and progress on a security release. If no patch is forthcoming or the vulnerable software has been closed and dropped from the official WordPress and repositories, you should consider deactivation and removal in favor of alternative solutions.

Please note we’ve revised last week’s report to correct the list of vulnerable code after many of the previous week’s vulnerabilities were mistakenly included. Thanks to Jeff Severson of JTS Design for bringing this to our attention.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins that have not been updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new WordPress plugin, theme, and core vulnerabilities that have emerged since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you are using vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

These reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.

WordPress Plugin Vulnerabilities with Patches

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities that have been fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity, thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, which represent the largest target for attackers.

Advanced Custom Fields

Product image for Advanced Custom Fields (ACF).

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 6.1.6.

YARPP

Product image for YARPP – Yet Another Related Posts Plugin.

CVE
2023-0579
The vulnerability has been patched, so you should update to version 5.30.3.

Advanced Woo Search

Product image for Advanced Woo Search.

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-2452
The vulnerability has been patched, so you should update to version 2.78.

FV Flowplayer Video Player

Product image for FV Flowplayer Video Player.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 7.5.35.7212.

Participants Database

Product image for Participants Database.

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 2.5.0.

URL Params

Product image for URL Params.

Plugin
URL Params
Vulnerability
Cross Site Scripting (XSS)
CVE
2023-0274
The vulnerability has been patched, so you should update to version 2.5.

Ko-fi Button

Product image for Ko-fi Button.

Plugin
Ko-fi Button
Vulnerability
Cross Site Scripting (XSS)
CVE
2023-2254
The vulnerability has been patched, so you should update to version 1.3.3.

Booking Manager

Product image for Booking Manager.

Vulnerability
Server Side Request Forgery (SSRF)
CVE
2023-1977
The vulnerability has been patched, so you should update to version 2.0.29.

Spiffy Calendar

Product image for Spiffy Calendar.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.9.4.

Stagtools

Product image for StagTools.

Plugin
StagTools
Vulnerability
Cross Site Scripting (XSS)
CVE
2023-0891
The vulnerability has been patched, so you should update to version 2.3.7.

WP Inventory Manager

Product image for WP Inventory Manager.

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-2123
The vulnerability has been patched, so you should update to version 2.1.0.13.

WP Directory Kit

Product image for WP Directory Kit.

Vulnerability
Cross Site Request Forgery (CSRF)
CVE
2023-2279
The vulnerability has been patched, so you should update to version 1.2.2.

WP Directory Kit

Product image for WP Directory Kit.

CVE
2023-2280
The vulnerability has been patched, so you should update to version 1.2.3.

Albo Pretorio On line

Product image for Albo Pretorio On line.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.6.4.

Albo Pretorio On line

Product image for Albo Pretorio On line.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.6.4.

TP Education

Product image for TP Education.

Plugin
TP Education
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.5.

WP Docs

Product image for WP Docs.

Plugin
WP Docs
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.0.0.

WP SMTP Mailing Queue

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-1090
The vulnerability has been patched, so you should update to version 2.0.1.

Library Viewer

Product image for Library Viewer.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 2.0.6.1.

Library Viewer

Product image for Library Viewer.

The vulnerability has been patched, so you should update to version 2.0.6.1.

Hostel

Product image for Hostel.

Plugin
Hostel
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.1.5.2.

Advanced Custom Fields Pro

Plugin
Advanced Custom Fields PRO
Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 6.1.6.

Advanced Custom Fields Pro

Plugin
Advanced Custom Fields PRO
CVE
2023-1196
The vulnerability has been patched, so you should update to version 6.1.0.

tagDiv Composer

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-1596
The vulnerability has been patched, so you should update to version 4.0.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

Easy Appointments

Product image for Easy Appointments.

Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Multi Rating

Product image for Multi Rating.

Plugin
Multi Rating
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Multi Rating

Product image for Multi Rating.

Plugin
Multi Rating
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Multi Rating

Product image for Multi Rating.

Plugin
Multi Rating
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

REST API TO MiniProgram

Product image for REST API TO MiniProgram.

Patched in Version
No Fix
CVE
2023-0551
The vulnerability has not been patched. You should deactivate the plugin.

Tiempo.com

Plugin
Tiempo.com
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-2271
The vulnerability has not been patched. You should deactivate the plugin.

Tiempo.com

Plugin
Tiempo.com
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-0058
The vulnerability has not been patched. You should deactivate the plugin.

Tiempo.com

Plugin
Tiempo.com
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-2272
The vulnerability has not been patched. You should deactivate the plugin.

Manager for Icommon

Product image for Manager for Icomoon.

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

Manager for Icommon

Product image for Manager for Icomoon.

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

WP Abstracts

Product image for WP Abstracts.

Plugin
WP Abstracts
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

UserAgent-Spy

Plugin
UserAgent-Spy
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-2490
The vulnerability has not been patched. You should deactivate the plugin.

WordPress Theme Vulnerabilities

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you will need to find an alternative theme. Deactivate and delete persistently unpatched themes and those that have been “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, simply delete it.

Editorialmag

Product image for Editorialmag.

Theme
Editorialmag
Patched in Version
No Fix
The vulnerability has not been patched. You should switch themes.

JupiterX

The vulnerability has been patched, so you should update to version 3.1.0.

TheGem (Elementor)

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 5.8.1.1.

TheGem (Elementor)

The vulnerability has been patched, so you should update to version 5.8.1.1.

TheGem (WPBakery)

The vulnerability has been patched, so you should update to version 5.8.1.1.

TheGem (WPBakery)

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 5.8.1.1.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – May 10, 2023 appeared first on iThemes.

This content was originally published here.