WordPress Vulnerability Report – October 26, 2022


Warning: getimagesize(https://ps.w.org/resmushit-image-optimizer/assets/banner-1544x500.png?rev=2296679): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/profilegrid-user-profiles-groups-and-communities/assets/banner-1544x500.png?rev=2556305): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/super-testimonial/assets/banner-772x250.png?rev=1666423): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-attachments/assets/banner-1544x500.png?rev=2617427): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/chat-bubble/assets/banner-1544x500.png?rev=2507388): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

Next Tuesday, November 1, 2022, WordPress 6.1 will be released with a number of dramatic improvements. The iThemes team has taken a comprehensive look at what this new release means for you. Take a look at our overview to get prepared for what WP 6.1 will bring to your site. As always, with a major release like this, it makes sense to ensure your site is backed up with BackupBuddy before updating.

The Future of Authentication is Passkeys! Login to your WordPress site with Biometrics only available in iThemes Security Pro

The problems of brute force attacks through credential stuffing, phishing attacks, and reused passwords have made our digital lives less secure. We’ve all tried to encourage 2-factor authentication as a protection, but less than 30% of users actually use 2FA. Password-based logins are a problem.

The future of authentication is passkeys, and iThemes Security Pro is the first to bring this breakthrough technology to WordPress sites. Using breakthrough WebAuthn technology based on public/private cryptography, passkeys make passwords obsolete. Now, website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

WordPress Core Vulnerabilities

WordPress 6.0.3 was released on October 17, 2022. This security release features several security fixes. Because this is a security release, it is recommended that you update your sites immediately. Even if you have your sites set to auto-update, double-check that you’re protected.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

ImageMagick-Engine

Product image for ImageMagick Engine.

Vulnerability
Command Injection via CSRF
The vulnerability has been patched, so you should update to version 1.7.6.

Testimonials Free

Product image for Testimonials.

Plugin
Testimonials
Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 2.7.

WP Attachments

Product image for WP Attachments.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 5.0.5.

WPForms Pro

The vulnerability has been patched, so you should update to version 1.7.7.

Testimonials Pro

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 1.0.8.

tagDiv Composer

The vulnerability has been patched, so you should update to version 3.5.

WPQA

The vulnerability has been patched, so you should update to version 5.9.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

Webmaster Tools Verification

Vulnerability
Unauthenticated Arbitrary Plugin Deactivation
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Grid Kit Premium

Patched in Version
No Fix
The vulnerability has not been patched. You should deactivate the plugin.

OAuth Client by DigitialPixies

Vulnerability
Admin+ Stored Cross-Site Scripting; CSRF
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

tagDiv Composer

Product image for NewsMag.

Theme
NewsMag
The vulnerability has been patched, so you should update to version 5.2.2.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, lots of new WordPress plugin and theme vulnerabilities are disclosed each week. We know it can be difficult to stay on top of every reported vulnerability disclosure, so the iThemes Security Pro plugin makes it easy to make sure your site isn’t running a theme, plugin, or WordPress core version with a known vulnerability.

Scans Your Website Twice a Day for Vulnerabilities

Your website’s plugins, themes, and WordPress core versions are checked against the WPScan Vulnerability Database for the latest vulnerability disclosures.

Automatically Updates if a Security Fix is Available

Paired with Version Management, iThemes Security will automatically update a plugin, theme, or WordPress core version if it has a vulnerability.

Emails You if Site Scan Detects a Vulnerability

You can receive an email report if your site is running vulnerable versions of a plugin, theme, or WordPress core. Customize the email addresses that receive scan results.

The Best WordPress Security Plugin to Secure & Protect WordPress Sites

WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. The iThemes Security Pro plugin takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. It’s like having a full-time security expert on staff who constantly monitors and protects your WordPress site for you.

The post WordPress Vulnerability Report – October 26, 2022 appeared first on iThemes.

This content was originally published here.