WordPress Vulnerability Report – September 14, 2022


Warning: getimagesize(https://ps.w.org/booking/assets/banner-772x250.png?rev=2762246): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/dsgvo-all-in-one-for-wp/assets/banner-772x250.png?rev=2292952): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-socializer/assets/banner-1544x500.png?rev=2771242): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/goolytics-simple-google-analytics/assets/banner-772x250.png?rev=664470): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/donation-thermometer/assets/banner-772x250.png?rev=670464): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/nmedia-user-file-uploader/assets/banner-772x250.jpg?rev=2394615): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/zephyr-project-manager/assets/banner-772x250.png?rev=1934187): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

WordPress Core Vulnerabilities

WordPress 6.0.2 was released on August 30, 2022. This security and maintenance release features 12 bug fixes on Core, 5 bug fixes for the Block Editor, and 3 security fixes. Because this is a security release, it is recommended that you update your sites immediately.

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress Core Dropping Support for WordPress Versions 3.7. – 4.0

In more WordPress core security news, the WordPress Security Team will no longer provide security updates for WordPress core versions 3.7 – 4.0. Please make sure all your WordPress sites are running the latest version.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

BackupBuddy

Product image for BackupBuddy.

Vulnerability
Unauthenticated Arbitrary File Access
The vulnerability has been patched, so you should update to version 8.7.5.

Booking Calendar

Product image for Booking Calendar.

Vulnerability
Arbitrary Translation Update via CSRF
The vulnerability has been patched, so you should update to version 9.2.2.

DSGVO All in one for WP

Product image for DSGVO All in one for WP.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 4.2.

Goolytics – Simple Google Analytics

Product image for Goolytics – Simple Google Analytics.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 1.1.2.

Donation Thermometer

Product image for Donation Thermometer.

Vulnerability
Admin+ Stored Cross-Site Scripting
The vulnerability has been patched, so you should update to version 2.1.3.

Zephyr Project Manager

Product image for Zephyr Project Manager.

Vulnerability
Unauthorised AJAX Calls To Stored XSS
The vulnerability has been patched, so you should update to version 3.2.55.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

Ketchup Restaurant Reservations

Vulnerability
Unauthenticated Stored XSS; Unauthenticated Blind SQLi
Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

  • Good news! No new WordPress theme vulnerabilities were disclosed this week.

Try it, Free! Passkeys + Biometric Logins for WordPress

The easiest and most secure way to log in to your WordPress site is here and ready for you to test! iThemes Security Pro has added biometric logins (like Face ID, Touch ID, and Windows Hello) and passkey technology supported by all major browsers, including Chrome, Firefox, and Safari. Now website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

We need your help testing this release candidate of iThemes Security Pro. Your testing and feedback will help us fine-tune this release so passkeys are easy for everyone to set up and use. to get a free sandbox site.

All current customers of iThemes Security Pro, the Essentials Bundle, the Plugin Suite, and the WordPress Web Designer’s Toolkit will get instant access to Biometric Logins + Passkeys when it launches this month!

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, lots of new WordPress plugin and theme vulnerabilities are disclosed each week. We know it can be difficult to stay on top of every reported vulnerability disclosure, so the iThemes Security Pro plugin makes it easy to make sure your site isn’t running a theme, plugin, or WordPress core version with a known vulnerability.

Scans Your Website Twice a Day for Vulnerabilities

Your website’s plugins, themes, and WordPress core versions are checked against the WPScan Vulnerability Database for the latest vulnerability disclosures.

Automatically Updates if a Security Fix is Available

Paired with Version Management, iThemes Security will automatically update a plugin, theme, or WordPress core version if it has a vulnerability.

Emails You if Site Scan Detects a Vulnerability

You can receive an email report if your site is running vulnerable versions of a plugin, theme, or WordPress core. Customize the email addresses that receive scan results.

The Best WordPress Security Plugin to Secure & Protect WordPress Sites

WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. The iThemes Security Pro plugin takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. It’s like having a full-time security expert on staff who constantly monitors and protects your WordPress site for you.

The post WordPress Vulnerability Report – September 14, 2022 appeared first on iThemes.

This content was originally published here.

Sign Up for Updates and Special Offers

Jeff Kerby

CEO | KERBCO Web Services