WordPress Vulnerability Report – May 18, 2022


Warning: getimagesize(https://ps.w.org/wp-db-backup/assets/banner-1544x500.png?rev=2645691): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/throws-spam-away/assets/banner-772x250.png?rev=927374): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wordpress-plugin-for-simple-google-adsense-insertion/assets/banner-772x250.jpg?rev=1135850): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/slider-video/assets/banner-772x250.png?rev=2635417): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/formcraft-form-builder/assets/banner-1544x500.png?rev=1739951): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/user-meta/assets/banner-1544x500.png?rev=2539531): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/pie-forms-for-wp/assets/banner-1544x500.jpg?rev=2372807): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/greenwallet-gateway/assets/banner-772x250.png?rev=2707881): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities, and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

WordPress Core Vulnerabilities

WordPress 5.9.3 was released on April 5, 2022, as a short-cycle maintenance release with 19 bug fixes. Because this is a core update, be sure to update to WordPress 5.9.3 as soon as possible.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

WP Statistics

Product image for WP Statistics.

Plugin
WP Statistics
The vulnerability has been patched, so you should update to version 13.2.2.

FiboSearch

Product image for FiboSearch – Ajax Search for WooCommerce.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 1.18.0.

Database Backup for WordPress

Product image for Database Backup for WordPress.

Vulnerability
Arbitrary Schedule Settings Update via CSRF
The vulnerability has been patched, so you should update to version 2.5.2.

Throws SPAM Away

Product image for Throws SPAM Away.

Vulnerability
Comment Deletion via CSRF
The vulnerability has been patched, so you should update to version 3.3.1.

WP Simple Adsense Insertion

Product image for WP Simple Adsense Insertion.

Vulnerability
Inject ads and javascript via CSRF
The vulnerability has been patched, so you should update to version 2.1.

Video Slider – Slider Carousel

Product image for Video Slider – Slider Carousel.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 1.4.8.

WPify Woo Czech

Vulnerability
Reflected Cross-Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 3.5.7.

Files Download Delay

The vulnerability has been patched, so you should update to version 1.0.7.

WooCommerce Green Wallet Gateway

Product image for WooCommerce Green Wallet Gateway.

Vulnerability
Reflected Cross Site Scripting in checkout page
The vulnerability has been patched, so you should update to version 1.0.2.

WPQA

Vulnerability
Unauthenticated Private Message Disclosure; Reflected Cross-Site Scripting
The vulnerability has been patched, so you should update to version 5.5.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

Donations

Plugin
Donations
Vulnerability
Contributor+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Quotes llama

Plugin
Quotes llama
Vulnerability
Admin+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Easy FAQ with Expanding Text

Vulnerability
Admin+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

LiveSync for WordPress

Vulnerability
Arbitrary Settings Update via CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WP Born Babies

Vulnerability
Contributor+ Stored Cross-Site Scripting
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Five Minute Webshop

Vulnerability
Admin+ SQLi via orderby
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

Discy

Vulnerability
Restore Default Settings via CSRF; Settings Update via CSRF
The vulnerability has been patched, so you should update to version 5.2.

Ask Me

Vulnerability
Multiple CSRF in AJAX Actions; Reflected Cross-Site Scripting
The vulnerability has been patched, so you should update to version 6.8.2.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, lots of new WordPress plugin and theme vulnerabilities are disclosed each week. We know it can be difficult to stay on top of every reported vulnerability disclosure, so the iThemes Security Pro plugin makes it easy to make sure your site isn’t running a theme, plugin, or WordPress core version with a known vulnerability.

Scans Your Website Twice a Day for Vulnerabilities

Your website’s plugins, themes, and WordPress core versions are checked against the WPScan Vulnerability Database for the latest vulnerability disclosures.

Automatically Updates if a Security Fix is Available

Paired with Version Management, iThemes Security will automatically update a plugin, theme, or WordPress core version if it has a vulnerability.

Emails You if Site Scan Detects a Vulnerability

You can receive an email report if your site is running vulnerable versions of a plugin, theme, or WordPress core. Customize the email addresses that receive scan results.

The Best WordPress Security Plugin to Secure & Protect WordPress Sites

WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. The iThemes Security Pro plugin takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. It’s like having a full-time security expert on staff who constantly monitors and protects your WordPress site for you.

The post WordPress Vulnerability Report – May 18, 2022 appeared first on iThemes.

This content was originally published here.