In blog, CMS, News, SEO, WordPress

The WordPress Vulnerability report is as follows.

XSS Vulnerability Discovered In TinyMCE HTML Text Editor

A serious vulnerability existed in TinyMCE HTML text editor. Exploiting the vulnerability could result in arbitrary code execution.

The TinyMCE HTML text editor had a serious vulnerability threatening numerous websites. This open-source text editor is in use by various Content Management Systems (CMS) such as WordPress and Joomla!.

WordPress Security Fundamentals – ReadWrite

WordPress dominates the global market of content management systems (CMS). Its tremendous popularity makes it a lure for malicious actors. The WordPress Core in its current state is fairly secure by design, which explains the relatively small number of hacks exploiting it. Here is a guide to WordPress security fundamentals.

WordPress Themes Vulnerabilities

1. FoodBakery

  • FoodBakery versions 1.9 and below have an Unauthenticated Reflected XSS vulnerability.
  • The vulnerability has been hot patched in version 1.9. However, no new version has been released. As a result, there are two versions 1.9, one vulnerable, and one with the patch. You should reach out to the developer to confirm you have received that patch.

2. Konzept

  • Konzept versions below 2.5 have an Unauthenticated Reflected XSS vulnerability.
  • The vulnerability is patched, and you should update to version 2.5.

3. Nova Lite

  • Nova Lite versions below 1.3.9 have an Unauthenticated Reflected Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.3.9.

4. Home Villas

  • All versions of Home Villas have Multiple Cross-Site Scripting vulnerabilities.
  • Remove the theme until a security fix is released.

5. Geo Magazine

  • All versions of Geo Magazine have an Unauthenticated Reflected XSS vulnerability.
  • Remove the theme until a security fix is released.

WordPress Plugin Vulnerabilities

Several new WordPress plugin vulnerabilities have been discovered this month so far. Make sure to follow the suggested action below to update the plugin or completely uninstall it.

WordPress Plugin Vulnerabilities

1. Critical Flaws in WordPress Quiz Plugin Allow Site Takeover

  • A plugin that is designed to add quizzes and surveys to WordPress websites has patched two critical vulnerabilities. The flaws can be exploited by remote, unauthenticated attackers to launch varying attacks – including fully taking over vulnerable websites.
  • The plugin, Quiz and Survey Master, is actively installed on over 30,000 websites. The two critical flaws discovered by researchers include an arbitrary file-upload vulnerability, ranking 10 out of 10 on the CVSS scale; as well as an unauthenticated arbitrary file deletion error, ranking 9.9 out of 10.
  • A patch is available for both issues in version 7.0.1 of the plugin, said the researchers with Wordfence who discovered the flaws, in a Thursday post.

2. Quiz And Master Survey WP Plugin Vulnerabilities Allowed Site Takeover

  • Critical vulnerabilities existed in the Quiz and Master Survey plugin that threatened thousands of websites. Exploiting the flaw could allow an attacker to takeover the target website.
  • The first of these is a critical severity bug that received a CVSS score of 10.0. The problem affected the file upload feature of the plugin. While this feature facilitates uploading files in response to a survey, its unsecured implementation could allow malicious attacks.
  • The second vulnerability was also a critical severity bug with a CVSS score of 9.9. It aroused because of the improper implementation of the file delete feature.

3. High-Severity Vulnerability Patched in Advanced Access Manager

  • The Wordfence Threat Intelligence team finished investigating two vulnerabilities in Advanced Access Manager, a WordPress plugin with over 100,000 installations, including a high-severity Authorization Bypass vulnerability that could lead to privilege escalation and site takeover.
  • After providing the full vulnerability disclosure, we received a response on August 15, 2020, that a patch had been released in version 6.6.2.

4. Ultimate Member

  • Ultimate Member versions below 2.1.7 have an Unauthenticated Open Redirect vulnerability.
  • The vulnerability is patched, and you should update to version 2.1.7.

5. Sell Media

  • Sell Media versions below 2.4.2 have Unauthenticated Reflected Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 2.4.2.

6. WordPress fancyBox Lightbox

  • WordPress fancyBox Lightbox versions below 1.0.2 have an Authenticated Stored Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.0.2.

7. WordPress Colorbox Lightbox

  • WordPress Colorbox Lightbox versions below 1.1.3 have an Authenticated Stored Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.1.3.

8. Sell Photo

  • All versions of Sell Photo Authenticated Stored Cross-Site Scripting vulnerability.
  • Remove the plugin until a security fix is released.

9. Responsive Lightbox2

  • Responsive Lightbox2 versions below 1.0.3 have an Authenticated Stored Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.0.3.

10. NextGEN Gallery Sell Photo

  • All versions of NextGEN Gallery Sell Photo have an Authenticated Stored Cross-Site Scripting vulnerability.
  • Remove the plugin until a security fix is released.

11. Easy Media Download

  • Easy Media Download versions below 1.1.5 have an Authenticated Stored Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.1.5.

12. Internal Links Manager

  • All versions of Internal Links Manager have Multiple Authenticated Stored Cross-Site Scripting vulnerabilities.
  • Remove the plugin until a security fix is released.

13. Elegant Testimonial

  • All versions of Elegant Testimonial have Multiple Authenticated Stored Cross-Site Scripting vulnerabilities.
  • Remove the plugin until a security fix is released.

14. Click to top

  • Click to top versions below 1.2.7 have an Authenticated Stored Cross-Site Scripting vulnerability.
  • The vulnerability is patched, and you should update to version 1.2.7.

15. WP Customer Reviews

  • WP Customer Reviews versions below 3.4.3 have Multiple Unauthenticated and Low Privilege Authenticated Stored XSS vulnerabilities.
  • The vulnerabilities are patched, and you should update to version 3.4.3.

16. Discount Rules for WooCommerce

  • Discount Rules for WooCommerce versions below 2.1.0 have Multiple vulnerabilities.
  • The vulnerabilities are patched, and you should update to version 2.1.0.

17. Advanced Access Manager

  • Advanced Access Manager versions below 6.6.2 have an Authenticated Authorization Bypass and a Privilege Escalation vulnerabilities.
  • The vulnerabilities are patched, and you should update to version 6.6.2.

18. WooCommerce – NAB Transact

  • WooCommerce – NAB Transact versions below 2.1.2 have a Payment Bypass vulnerability.
  • The vulnerability is patched, and you should update to version 2.1.2.

19. Kali Forms

  • Kali Forms versions below 2.1.2 have multiple vulnerabilities.
  • The vulnerabilities are patched, and you should update to version 2.1.2.

20. RSVPMaker

  • RSVPMaker versions below 7.8.2 have an Unauthenticated SQL Injection vulnerability.
  • The vulnerability is patched, and you should update to version 7.8.2.

20. Autoptimize

  • Autoptimize versions below 2.7.7 have an Authenticated Arbitrary File Upload vulnerability.
  • The vulnerability is patched, and you should update to version 2.7.7.

It is crucial to the security of your WordPress site that you have an update routine.
You should be logging into your sites at least once a week to perform updates.

 

Contact Us

Contact Us

Not readable? Change text. captcha txt
internal-linkingWordPress Vulnerability Report: January 2020