WordPress Vulnerability Report

WordPress Vulnerability Report – September 20, 2023

Since last week, 57 total vulnerabilities emerged in public disclosure. They may affect over five million WordPress sites. There are 37 plugin vulnerabilities with security patches, so run those updates! Additionally, there are 20 plugin vulnerabilities with no patch available yet. If you use an unpatched plugin or theme, check their vendors' intentions and progress on a security release.

Dan Knauss

Since last week, 57 total vulnerabilities emerged in public disclosure. They may affect over five million WordPress sites. There are 37 plugin vulnerabilities with security patches, so run those updates!

Additionally, there are 20 plugin vulnerabilities with no patch available yet. If you use an unpatched plugin or theme, check their vendors’ intentions and progress on a security release. Suppose no patch is forthcoming or the vulnerable software has been marked “closed” and dropped from the official WordPress theme and plugin repositories. In that case, you should consider deactivation and removal in favor of alternative solutions.

WordPress Core Vulnerabilities — Patched

No new WordPress core vulnerabilities were disclosed this week.

WordPress core is very secure when it’s properly configured and maintained. Vulnerable plugins not updated by site owners are the most common vector for attacks on WordPress websites. Our weekly WordPress Vulnerability Report, powered by Patchstack, covers new vulnerabilities that have emerged in plugins, themes, and/or WordPress core since last week’s report. Our goal is to spread awareness of emerging security threats and help you decide what to do if you find vulnerable software on your website. For a deeper analysis of recent trends in WordPress vulnerabilities and threat vectors, see our 2022 Annual Vulnerability Report.

These reports are published every Wednesday and include all active vulnerabilities tracked by Patchstack as of Monday since the previous report. This leaves a 48-hour window for the newest emerging vulnerabilities to be patched before full public disclosure. iThemes Security Pro users have access to vulnerability alerts emerging within this window.

WordPress Plugin Vulnerabilities — Patched

In this section, you’ll find the most recently disclosed WordPress plugin vulnerabilities fixed with a new release from their authors and maintainers. Please apply the updates if you are affected!

These vulnerabilities have been disclosed and scored for their severity, thanks to our friends at Patchstack. Each plugin listing includes the type of vulnerability with its CVE number and CVSS severity rating with links to more technical details. You’ll also see the number of active sites using the plugin and the plugin version release that patches the vulnerability. We start with the most popular plugins, representing the largest target for attackers.

Essential Addons for Elementor

Plugin Slug:
essential-addons-for-elementor-lite
Installations:
1,000,000+
Vulnerability:
Privilege Escalation
Patched in Version:
5.8.9
Severity Score:
High
The vulnerability has been patched, so you should update to version 5.8.9.

Enable Media Replace

Plugin Slug:
enable-media-replace
Installations:
600,000+
Vulnerability:
PHP Object Injection
Patched in Version:
4.1.3
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 4.1.3.

WPvivid

Plugin Slug:
wpvivid-backuprestore
Installations:
300,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
0.9.91
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 0.9.91.

WPvivid Backup Plugin

Plugin Slug:
wpvivid-backuprestore
Installations:
300,000+
Vulnerability:
Privilege Escalation
Patched in Version:
0.9.91
Severity Score:
High
The vulnerability has been patched, so you should update to version 0.9.91.

Slimstat Analytics

Plugin Slug:
wp-slimstat
Installations:
100,000+
Vulnerability:
SQL Injection
Patched in Version:
5.0.10
Severity Score:
High
The vulnerability has been patched, so you should update to version 5.0.10.

wpDiscuz

Plugin Slug:
wpdiscuz
Installations:
80,000+
Vulnerability:
SQL Injection
Patched in Version:
7.6.6
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 7.6.6.

wpDiscuz

Plugin Slug:
wpdiscuz
Installations:
80,000+
Vulnerability:
Insecure Direct Object References (IDOR)
Patched in Version:
7.6.4
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.6.4.

wpDiscuz

Plugin Slug:
wpdiscuz
Installations:
80,000+
Vulnerability:
Insecure Direct Object References (IDOR)
Patched in Version:
7.6.4
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.6.4.

Booster for WooCommerce

Plugin Slug:
woocommerce-jetpack
Installations:
60,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
7.1.1
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.1.1.

Booster for WooCommerce

Plugin Slug:
woocommerce-jetpack
Installations:
60,000+
Vulnerability:
Sensitive Data Exposure
Patched in Version:
7.1.1
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.1.1.

File Manager Pro

Plugin Slug:
filester
Installations:
50,000+
Vulnerability:
Cross Site Request Forgery (CSRF)
Patched in Version:
1.8
Severity Score:
High
The vulnerability has been patched, so you should update to version 1.8.

MapPress Maps for WordPress

Plugin Slug:
mappress-google-maps-for-wordpress
Installations:
50,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
2.88.5
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.88.5.

PowerPress

Plugin Slug:
powerpress
Installations:
40,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
11.0.11
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 11.0.11.

WP Customer Reviews

Plugin Slug:
wp-customer-reviews
Installations:
30,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
3.6.7
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 3.6.7.

Welcart e-Commerce

Plugin Slug:
usc-e-shop
Installations:
20,000+
Vulnerability:
SQL Injection
Patched in Version:
2.8.22
Severity Score:
High
The vulnerability has been patched, so you should update to version 2.8.22.

WordPress File Upload

Plugin Slug:
wp-file-upload
Installations:
20,000+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
4.23.3
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 4.23.3.

Statify

Plugin Slug:
extended-evaluation-for-statify
Installations:
10,000+
Vulnerability:
CSV Injection
Patched in Version:
2.6.4
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.6.4.

WPSchoolPress

Plugin Slug:
wpschoolpress
Installations:
2,000+
Vulnerability:
Cross Site Request Forgery (CSRF)
Patched in Version:
2.2.5
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.2.5.

Testimonial Slider Shortcode

Plugin Slug:
testimonial-slider-shortcode
Installations:
400+
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
1.1.9
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 1.1.9.

Essential Blocks Pro

Plugin Slug:
essential-blocks-pro
Vulnerability:
PHP Object Injection
Patched in Version:
1.1.1
Severity Score:
High
The vulnerability has been patched, so you should update to version 1.1.1.

Checkout Field Editor

Plugin Slug:
woocommerce-checkout-field-editor
Vulnerability:
Cross Site Request Forgery (CSRF)
Patched in Version:
1.7.5
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 1.7.5.

WooCommerce CVR Payment Gateway

Plugin Slug:
woocommerce-cvr-payment-gateway
Vulnerability:
Broken Access Control
Patched in Version:
6.1.0
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 6.1.0.

WooCommerce EAN Payment Gateway

Plugin Slug:
woocommerce-ean-payment-gateway
Vulnerability:
Broken Access Control
Patched in Version:
6.1.0
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 6.1.0.

WordPress Plugin Vulnerabilities — Unpatched

This section contains plugin vulnerabilities with no known fix. Until a patch is available, you are advised to deactivate the plugin, at minimum, immediately. If there is a high risk of active exploits or the plugin remains unpatched for weeks, you are advised to delete the plugin. You should also delete persistently unpatched plugins the WordPress.org repository has locked and marked “Closed” so they can no longer be downloaded and installed.

Read More & Accordion

Plugin Slug:
expand-maker
Installations:
20,000+
Vulnerability:
PHP Object Injection
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched. You should deactivate the plugin.

Allow PHP in Posts and Pages

Plugin Slug:
allow-php-in-posts-and-pages
Vulnerability:
Remote Code Execution (RCE)
Patched in Version:
No Fix
Severity Score:
Critical
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Awesome Weather Widget

Plugin Slug:
awesome-weather
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

BAN Users

Plugin:
BAN Users
Plugin Slug:
ban-users
Vulnerability:
Privilege Escalation
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Crayon Syntax Highlighter

Plugin Slug:
crayon-syntax-highlighter
Vulnerability:
Server Side Request Forgery (SSRF)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Dropbox Folder Share

Plugin Slug:
dropbox-folder-share
Vulnerability:
Server Side Request Forgery (SSRF)
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Dropbox Folder Share

Plugin Slug:
dropbox-folder-share
Vulnerability:
Local File Inclusion
Patched in Version:
No Fix
Severity Score:
Critical
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Horizontal scrolling announcement

Plugin Slug:
horizontal-scrolling-announcement
Vulnerability:
SQL Injection
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Horizontal scrolling announcement

Plugin Slug:
horizontal-scrolling-announcement
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Google Maps Plugin by Intergeo

Plugin Slug:
intergeo-maps
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

JQuery Accordion Menu Widget

Plugin Slug:
jquery-vertical-accordion-menu
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Leyka

Plugin:
Leyka
Plugin Slug:
leyka
Vulnerability:
Sensitive Data Exposure
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Login with phone number

Plugin Slug:
login-with-phone-number
Vulnerability:
Cross Site Request Forgery (CSRF)
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Photospace Responsive

Plugin Slug:
photospace-responsive
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Simplr Registration Form Plus+

Plugin Slug:
simplr-registration-form
Vulnerability:
Insecure Direct Object References (IDOR)
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Super Store Finder

Plugin Slug:
superstorefinder-wp
Vulnerability:
Broken Access Control
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched. You should deactivate the plugin.

WooCommerce Beta Tester

Plugin Slug:
woocommerce-beta-tester
Vulnerability:
SQL Injection
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WP User Control

Plugin Slug:
wp-user-control
Vulnerability:
Other Vulnerability Type
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WS Facebook Like Box Widget

Plugin Slug:
ws-facebook-likebox
Vulnerability:
Cross Site Scripting (XSS)
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, you’ll find the latest WordPress theme vulnerabilities to be disclosed. You’ll see the same information we provided above for vulnerable plugins, and the same advice applies. If a security update exists, install it immediately. If a vulnerability remains unpatched in a theme you are actively using, you must find an alternative theme. Deactivate and delete persistently unpatched themes and those marked “Closed” in the WordPress.org theme repository. If you have a vulnerable theme installed that you are not actively using, delete it.

No new WordPress theme vulnerabilities were disclosed this week.

Solid Security is part of Solid Suite — The best foundation for WordPress websites.

Every WordPress site needs security, backups, and management tools. That’s Solid Suite — an integrated bundle of three plugins: Solid Security, Solid Backups, and Solid Central. You also get access to Solid Academy’s learning resources for WordPress professionals. Build your next WordPress website on a solid foundation with Solid Suite!

Get Solid Security