WordPress Vulnerability Report – September 20, 2023


Warning: getimagesize(https://ps.w.org/essential-addons-for-elementor-lite/assets/banner-1544x500.gif?rev=2940672): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/pagelayer/assets/banner-1544x500.png?rev=2668020): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/essential-blocks/assets/banner-1544x500.gif?rev=2964327): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/modula-best-grid-gallery/assets/banner-772x250.jpg?rev=2914729): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-slimstat/assets/banner-1544x500.jpg?rev=2832242): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/filester/assets/banner-1544x500.png?rev=2349992): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/mappress-google-maps-for-wordpress/assets/Banner-1544x500.png?rev=2410210): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/powerpress/assets/banner-1544x500.jpg?rev=2849855): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/poptin/assets/banner-1544x500.png?rev=2779830): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wp-file-upload/assets/banner-1544x500.png?rev=1303941): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/extended-evaluation-for-statify/assets/banner-772x250.png?rev=1392307): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/mwp-herd-effect/assets/banner-772x250.png?rev=1521786): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/wpschoolpress/assets/banner-1544x500.jpg?rev=2004625): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/bit-assist/assets/banner-1544x500.png?rev=2814894): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/funnelforms-free/assets/banner-1544x500.png?rev=2833914): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Warning: getimagesize(https://ps.w.org/testimonial-slider-shortcode/assets/banner-772x250.png?rev=1515961): failed to open stream: HTTP request failed! HTTP/1.1 403 Forbidden in /home/customer/www/kerbco.com/public_html/wp-content/plugins/code-snippets/php/snippet-ops.php(582) : eval()'d code on line 22

Since last week, 57 total vulnerabilities emerged in public disclosure. They may affect over five million WordPress sites. There are 37 plugin vulnerabilities with security patches, so run those updates!

Additionally, there are 20 plugin vulnerabilities with no patch available yet. If you use an unpatched plugin or theme, check their vendors’ intentions and progress on a security release. Suppose no patch is forthcoming or the vulnerable software has been marked “closed” and dropped from the official WordPress theme and plugin repositories. In that case, you should consider deactivation and removal in favor of alternative solutions.

WordPress Core Vulnerabilities — Patched

  • No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins not updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new vulnerabilities that have emerged in plugins, themes, and/or WordPress core since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you find vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

These reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.

WordPress Plugin Vulnerabilities — Patched

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity, thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, representing the largest target for attackers.

Enable Media Replace

Product image for Enable Media Replace.

The vulnerability has been patched, so you should update to version 4.1.3.

Slimstat Analytics

Product image for Slimstat Analytics.

CVE
2023-4598
The vulnerability has been patched, so you should update to version 5.0.10.

wpDiscuz

Product image for Comments – wpDiscuz.

The vulnerability has been patched, so you should update to version 7.6.6.

wpDiscuz

Product image for Comments – wpDiscuz.

Vulnerability
Insecure Direct Object References (IDOR)
CVE
2023-3869
The vulnerability has been patched, so you should update to version 7.6.4.

wpDiscuz

Product image for Comments – wpDiscuz.

Vulnerability
Insecure Direct Object References (IDOR)
CVE
2023-3998
The vulnerability has been patched, so you should update to version 7.6.4.

Booster for WooCommerce

Product image for Booster for WooCommerce.

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-4945
The vulnerability has been patched, so you should update to version 7.1.1.

File Manager Pro

Product image for File Manager Pro – Filester.

Vulnerability
Cross Site Request Forgery (CSRF)
CVE
2023-4827
The vulnerability has been patched, so you should update to version 1.8.

MapPress Maps for WordPress

Product image for MapPress Maps for WordPress.

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-4840
The vulnerability has been patched, so you should update to version 2.88.5.

WP Customer Reviews

Product image for WP Customer Reviews.

Vulnerability
Cross Site Scripting (XSS)
CVE
2023-4648
The vulnerability has been patched, so you should update to version 3.6.7.

Welcart e-Commerce

Product image for Welcart e-Commerce.

The vulnerability has been patched, so you should update to version 2.8.22.

WordPress File Upload

Product image for WordPress File Upload.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 4.23.3.

Testimonial Slider Shortcode

Product image for Testimonial Slider Shortcode.

Vulnerability
Cross Site Scripting (XSS)
The vulnerability has been patched, so you should update to version 1.1.9.

Essential Blocks Pro

CVE
2023-4386
The vulnerability has been patched, so you should update to version 1.1.1.

Checkout Field Editor

Vulnerability
Cross Site Request Forgery (CSRF)
The vulnerability has been patched, so you should update to version 1.7.5.

WooCommerce CVR Payment Gateway

Plugin
WooCommerce CVR Payment Gateway
CVE
2023-4948
The vulnerability has been patched, so you should update to version 6.1.0.

WooCommerce EAN Payment Gateway

Plugin
WooCommerce EAN Payment Gateway
CVE
2023-4947
The vulnerability has been patched, so you should update to version 6.1.0.

WordPress Plugin Vulnerabilities — Unpatched

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

Patched in Version
No Fix
CVE
2023-3392
The vulnerability has not been patched. You should deactivate the plugin.

Allow PHP in Posts and Pages

Plugin
Allow PHP in Posts and Pages
Vulnerability
Remote Code Execution (RCE)
Patched in Version
No Fix
CVE
2023-4994
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Awesome Weather Widget

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-4944
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

BAN Users

Patched in Version
No Fix
CVE
2023-4153
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Crayon Syntax Highlighter

Vulnerability
Server Side Request Forgery (SSRF)
Patched in Version
No Fix
CVE
2023-4893
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Dropbox Folder Share

Vulnerability
Server Side Request Forgery (SSRF)
Patched in Version
No Fix
CVE
2023-3025
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Dropbox Folder Share

Patched in Version
No Fix
CVE
2023-4488
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Horizontal scrolling announcement

Patched in Version
No Fix
CVE
2023-4999
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Horizontal scrolling announcement

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-5001
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Google Maps Plugin by Intergeo

Plugin
Google Maps Plugin by Intergeo
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-4887
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

JQuery Accordion Menu Widget

Plugin
JQuery Accordion Menu Widget
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-4890
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Leyka

Patched in Version
No Fix
CVE
2023-4917
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Login with phone number

Plugin
Login with phone number
Vulnerability
Cross Site Request Forgery (CSRF)
Patched in Version
No Fix
CVE
2023-4916
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Photospace Responsive

Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-4271
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Simplr Registration Form Plus+

Plugin
Simplr Registration Form Plus+
Vulnerability
Insecure Direct Object References (IDOR)
Patched in Version
No Fix
CVE
2023-4213
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Super Store Finder

Patched in Version
No Fix
CVE
2023-5054
The vulnerability has not been patched. You should deactivate the plugin.

WooCommerce Beta Tester

Patched in Version
No Fix
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WP User Control

Patched in Version
No Fix
CVE
2023-4915
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WS Facebook Like Box Widget

Plugin
WS Facebook Like Box Widget
Vulnerability
Cross Site Scripting (XSS)
Patched in Version
No Fix
CVE
2023-4963
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information we provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you must find an alternative theme. Deactivate and delete persistently unpatched themes and those marked “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, delete it.

  • No new WordPress theme vulnerabilities were disclosed this week.

Never worry about running a vulnerable plugin or theme again.

As you can see from this report, new WordPress plugin and theme vulnerabilities are disclosed every week. We know it can be difficult to stay on top of every reported vulnerability disclosure that matters to you, so the Themes Security Pro plugin makes it easy to ensure your site isn’t running a vulnerable theme, plugin, or version of WordPress core.

The post WordPress Vulnerability Report – September 20, 2023 appeared first on iThemes.

This content was originally published here.