WordPress Vulnerability Report

WordPress Vulnerability Report – August 31, 2022

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website. Each vulnerability will have a severity rating of low, medium, high, or critical.

Avatar photo
SolidWP Editorial Team

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

Get SolidWP tips direct in your inbox

Sign up

This field is for validation purposes and should be left unchanged.
Placeholder text
Placeholder text
Thanks

Oops something went wrong, please try submitting again

Get started with confidence — risk free, guaranteed

WordPress Core Vulnerabilities

WordPress 6.0.2 is now available! This security and maintenance release features 12 bug fixes on Core, 5 bug fixes for the Block Editor, and 3 security fixes. Because this is a security release, it is recommended that you update your sites immediately.

WordPress Core

Vulnerability:
Authenticated Stored Cross-Site Scripting; SQLi via Link API; Reflected Cross-Site Scripting
Patched in Version:
6.0.2
Severity Score:
Low
The vulnerability has been patched, so you should update to version 6.0.2.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

All-in-One WP Migration

Installations:
4,000,000+
Vulnerability:
Unauthenticated Reflected XSS
Patched in Version:
7.63
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.63.

Beaver Builder

Installations:
200,000+
Vulnerability:
Authenticated Stored XSS via Text Editor; Authenticated Stored XSS via Caption On Hover; Authenticated Stored XSS via Caption; Authenticated Stored XSS via Image URL
Patched in Version:
2.5.5.3
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.5.5.3.

WPvivid Backup

Installations:
200,000+
Vulnerability:
Admin+ Arbitrary File Deletion
Patched in Version:
0.9.77
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 0.9.77.

WPtouch

Plugin:
WPtouch
Installations:
100,000+
Vulnerability:
Reflected Cross-Site Scripting
Patched in Version:
4.3.44
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 4.3.44.

WordPress Ping Optimizer

Installations:
70,000+
Vulnerability:
Arbitrary Settings Update via CSRF
Patched in Version:
2.35.1.3.0
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.35.1.3.0.

Ajax Load More

Installations:
50,000+
Vulnerability:
Admin+ Arbitrary File Read
Patched in Version:
5.5.4.1
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 5.5.4.1.

Scroll To Top

Installations:
10,000+
Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
1.4.1
Severity Score:
Low
The vulnerability has been patched, so you should update to version 1.4.1.

Simple File List

Installations:
5,000+
Vulnerability:
Reflected Cross-Site Scripting
Patched in Version:
4.4.12
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 4.4.12.

Zephyr Project Manager

Installations:
1,000+
Vulnerability:
Multiple Unauthenticated SQLi; Reflected Cross-Site Scripting; Unauthorised REST Calls to Stored XSS
Patched in Version:
3.2.5
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 3.2.5.

Alphabetic Pagination

Installations:
900+
Vulnerability:
Unauthenticated Arbitrary Option Update
Patched in Version:
3.0.8
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 3.0.8.

Form Builder CP

Installations:
900+
Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
1.2.32
Severity Score:
Low
The vulnerability has been patched, so you should update to version 1.2.32.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

Better Font Awesome

Installations:
100,000+
Vulnerability:
Settings Update via CSRF
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched. You should deactivate the plugin.

BadgeOS

Plugin:
BadgeOS
Installations:
5,000+
Vulnerability:
Subscriber+ SQLi
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched. You should deactivate the plugin.

Float to Top Button

Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
No Fix
Severity Score:
Low
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Gettext override translations

Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
No Fix
Severity Score:
Low
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Slickr Flickr

Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
No Fix
Severity Score:
Low
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

No new WordPress theme vulnerabilities were disclosed this week.

Try it, Free! Passkeys + Biometric Logins for WordPress

The easiest and most secure way to log in to your WordPress site is here and ready for you to test! iThemes Security Pro has added biometric logins (like Face ID, Touch ID, and Windows Hello) and passkey technology supported by all major browsers, including Chrome, Firefox, and Safari. Now website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

We need your help testing this release candidate of iThemes Security Pro. Your testing and feedback will help us fine-tune this release so passkeys are easy for everyone to set up and use. Learn more about the testing process here to get a free sandbox site.

All current customers of iThemes Security Pro, the Essentials Bundle, the Plugin Suite, and the WordPress Web Designer’s Toolkit will get instant access to Biometric Logins + Passkeys when it launches this month!

Solid Security is part of Solid Suite — The best foundation for WordPress websites.

Every WordPress site needs security, backups, and management tools. That’s Solid Suite — an integrated bundle of three plugins: Solid Security, Solid Backups, and Solid Central. You also get access to Solid Academy’s learning resources for WordPress professionals. Build your next WordPress website on a solid foundation with Solid Suite!

Get Solid Security

Did you like this article? Spread the word: