WordPress Vulnerability Report: December , Part 2

WordPress Vulnerability Report

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities, and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of Low, Medium, High, or Critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe.

Please share this post with your friends to help get the word out and make WordPress safer for everyone.

Contents of the December 8, 2021 Report

Want this report delivered to your inbox each week?

WordPress News: Gravatar Data Leak

This week Gravatar, a global service for unique avatars, was breached – although Gravatar assures there was no hack.

The data was scraped, which is not a breach because passwords and other private information weren’t taken. Instead, publicly available information was gathered in a way that is not normally easy to obtain. Theoretically, someone would have to know the username of the Gravatar user in order to access the email address of that user. The scraping allowed the attacker to download the usernames and the emails at the same time.

WordPress Core Vulnerabilities

The latest version of WordPress core is 5.8.2. As a best practice, always be sure to run the latest version of WordPress core!

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the version number if patched, and the severity rating.

1. Events Manager

[…]

 



This article was written by Michael Moore and originally published on WordPress News and Updates from iThemes – iThemes.

Disclosure: Some of the links in this post are "affiliate links." This means if you click on the link and purchase the product, We may receive an affiliate commission.

Leave a Comment

Your email address will not be published. Required fields are marked *

WordPress Vulnerability Report: December , Part 3

WordPress Vulnerability Report: September 2021, Part 5

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities, and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of Low, Medium, High, or Critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. New in this report: vulnerabilities are now listed in order by the number of active installs, rather than the date of the disclosure.

Please share this post with your friends to help get the word out and make WordPress safer for everyone.

Contents of the December 15, 2021 Report

Want this report delivered to your inbox each week?

As the busiest online shopping time of the year is in full swing, cybercriminals have been busy with attempts to “hack the planet.” Wordfence recently reported a massive wave of attacks that targeted 1.6 million WordPress sites over the course of just 36 hours!

Finally, BleepingComputer recently reported that hackers have been installing skimmer code into random plugins. To tighten security for e-commerce sites, we recommend requiring two-factor authentication for all admin users, activating trusted devices, file change detection, and that WordPress security logs be read and reviewed regularly.

WordPress Core Vulnerabilities

The latest version of WordPress core is 5.8.2. As a best practice, always be sure to run the latest version of WordPress core!

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the version number if patched, and the severity rating.

1. Elementor

Plugin: Elementor 
Vulnerability: DOM Cross-Site-Scripting
Active Installation: 5+ million
Patched in Version: 3.4.8
Severity Score:

[…]

 



This article was written by Michael Moore and originally published on WordPress News and Updates from iThemes – iThemes.

Disclosure: Some of the links in this post are "affiliate links." This means if you click on the link and purchase the product, We may receive an affiliate commission.

Leave a Comment

Your email address will not be published. Required fields are marked *

WordPress Vulnerability Report: November , Part 2

WordPress Vulnerability Report

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities, and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of Low, Medium, High, or Critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe.

Please share this post with your friends to help get the word out and make WordPress safer for everyone.

Contents of the November 10, 2021 Report

Want this report delivered to your inbox each week?

WordPress Core Vulnerabilities

The latest version of WordPress core is 5.8.1. As a best practice, always be sure to run the latest version of WordPress core!

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the version number if patched, and the severity rating.

Plugin: Contest Gallery
Vulnerability: Subscriber+ Email Address Disclosure
Patched in Version: 13.1.0.7
Severity Score: Medium

The vulnerability is patched, so you should update to version 13.1.0.7.

Plugin: Contest Gallery
Vulnerability: Missing Access Controls to Unauthenticated SQL injection / Email Address Disclosure
Patched in Version: 13.1.0.6
Severity Score: High

The vulnerability is patched, so you should update to version 13.1.0.6.

2. Check & Log Email

Plugin: Check & Log Email
Vulnerability: Reflected Cross-Site Scripting
Patched in Version: 1.0.4
Severity Score: High

[…]

 



This article was written by Michael Moore and originally published on WordPress News and Updates from iThemes – iThemes.

Disclosure: Some of the links in this post are "affiliate links." This means if you click on the link and purchase the product, We may receive an affiliate commission.

Leave a Comment

Your email address will not be published. Required fields are marked *

WordPress Vulnerability Report: April , Part 1

WordPress Vulnerability Roundup: December 2020, Part 2

Written by

Michael Moore
on

April 7, 2021

Last Updated on April 7, 2021

New WordPress plugin and vulnerabilities were disclosed during the first week of April. This post provides a report of recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

The WordPress Vulnerability Roundup is divided into three different categories: WordPress core, WordPress plugins, and WordPress themes. Each vulnerability includes information on which version you should be running, so be sure to update!

Each vulnerability will also have a severity rating of Low, Medium, High, or Critical. The severity ratings are based on a Common Vulnerability Scoring System designed to help you know how to measure the severity of a vulnerability.

In the April, Part 1 Report

WordPress Core Vulnerabilities

Great news! No new WordPress core vulnerabilities have been disclosed this month.

The latest version of WordPress is currently 5.7. Make sure all your websites are running the latest version of WordPress core.

WordPress Plugin Vulnerabilities

This section covers vulnerabilities in WordPress plugins with instructions on whether to update or remove the vulnerable plugin.

1. Controlled Admin Access

Vulnerability: Improper Access Control to Privilege Escalation
Patched in Version: 1.5.6
Severity: High – CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

The vulnerability is patched, so you should update to version 1.5.6+.

2. Advanced Booking Calendar

WordPress Vulnerability Report: April 2021, Part 1 1

Vulnerability: Authenticated Reflected Cross-Site Scripting
Patched in Version: 1.6.8
Severity: High – CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

The vulnerability is patched, so you should update to version 1.6.8+.

3. Cooked Pro

Vulnerability: Unauthenticated Reflected Cross-Site Scripting
Patched in Version: 1.7.5.6
Severity: Medium – CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

The vulnerability is patched, so you should update to version 1.7.5.6+.

4. SecuPress Free & Pro

 



This article was written by Michael Moore and originally published on WordPress News and Updates from iThemes – iThemes.

Disclosure: Some of the links in this post are "affiliate links." This means if you click on the link and purchase the product, We may receive an affiliate commission.

Leave a Comment

Your email address will not be published. Required fields are marked *

Show Your ❤️ Love! Like Us
Scroll to Top