WordPress Vulnerability Report

WordPress Vulnerability Report – September 7, 2022

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website. Each vulnerability will have a severity rating of low, medium, high, or critical.

Avatar photo
SolidWP Editorial Team

Vulnerable plugins and themes are the #1 reason WordPress websites get hacked. The weekly WordPress Vulnerability Report powered by WPScan covers recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.

Each vulnerability will have a severity rating of low, medium, high, or critical. Responsible disclosure and reporting of vulnerabilities is an integral part of keeping the WordPress community safe. Please share this post with your friends to help get the word out and make WordPress safer for everyone!

Get SolidWP tips direct in your inbox

Sign up

This field is for validation purposes and should be left unchanged.
Placeholder text
Placeholder text
Thanks

Oops something went wrong, please try submitting again

Get started with confidence — risk free, guaranteed

WordPress Core Vulnerabilities

WordPress 6.0.2 was released on August 30, 2022. This security and maintenance release features 12 bug fixes on Core, 5 bug fixes for the Block Editor, and 3 security fixes. Because this is a security release, it is recommended that you update your sites immediately.

WordPress Core

Vulnerability:
Authenticated Stored Cross-Site Scripting; SQLi via Link API; Reflected Cross-Site Scripting
Patched in Version:
6.0.2
Severity Score:
Low
The vulnerability has been patched, so you should update to version 6.0.2.

WordPress Core Dropping Support for WordPress Versions 3.7. – 4.0

In more WordPress core security news, the WordPress Security Team will no longer provide security updates for WordPress core versions 3.7 – 4.0. Please make sure all your WordPress sites are running the latest version.

BackupBuddy

We recently discovered a security vulnerability in our BackupBuddy plugin. The vulnerability could allow a breach of your WordPress site, so we are asking all customers to confirm your sites are running version 8.7.5 or higher of the BackupBuddy plugin. This vulnerability only impacts sites running BackupBuddy versions 8.5.8.0 through 8.7.4.1. Read more here.

BackupBuddy

Vulnerability:
Directory Traversal Vulnerability
Patched in Version:
8.7.5
Severity Score:
High
The vulnerability has been patched, so you should update to version 8.7.5.

WordPress Plugin Vulnerabilities

In this section, the latest WordPress plugin vulnerabilities have been disclosed. Each plugin listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

SVG Support

Installations:
1,000,000+
Vulnerability:
Author+ Stored Cross-Site Scripting
Patched in Version:
2.5
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.5.

Post SMTP

Installations:
300,000+
Vulnerability:
Admin+ Blind SSRF
Patched in Version:
2.1.7
Severity Score:
Low
The vulnerability has been patched, so you should update to version 2.1.7.

Beaver Builder

Installations:
200,000+
Vulnerability:
Authenticated Stored XSS via Caption On Hover; Authenticated Stored XSS via Caption
Patched in Version:
2.5.5.3
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.5.5.3.

Download Manager

Installations:
100,000+
Vulnerability:
Admin+ Arbitrary File/Folder Access via Path Traversal
Patched in Version:
3.2.55
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 3.2.55.

Booking Calendar

Installations:
60,000+
Vulnerability:
Arbitrary Translation Update via CSRF
Patched in Version:
9.2.2
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 9.2.2.

Restricted Site Access

Installations:
20,000+
Vulnerability:
Access Bypass via IP Spoofing
Patched in Version:
7.3.2
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 7.3.2.

Simple File List

Installations:
5,000+
Vulnerability:
Reflected Cross-Site Scripting
Patched in Version:
4.4.12
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 4.4.12.

Slider Hero

Installations:
4,000+
Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
8.4.4
Severity Score:
Low
The vulnerability has been patched, so you should update to version 8.4.4.

Generate PDF using Contact Form 7

Installations:
2,000+
Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
3.6
Severity Score:
Low
The vulnerability has been patched, so you should update to version 3.6.

CM Download Manager

Installations:
500+
Vulnerability:
Admin+ Arbitrary File Upload
Patched in Version:
2.8.6
Severity Score:
Medium
The vulnerability has been patched, so you should update to version 2.8.6.

OAuth client Single Sign On for WordPress

Installations:
100+
Vulnerability:
Unauthenticated Settings Update to Authentication Bypass
Patched in Version:
3.0.4
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 3.0.4.

Wordlift

Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
3.37.2
Severity Score:
Low
The vulnerability has been patched, so you should update to version 3.37.2.

Ldap WP Login / Active Directory Integration

Vulnerability:
Unauthenticated Settings Update to Auth Bypass; Reflected Cross-Site Scripting
Patched in Version:
3.0.2
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 3.0.2.

Scripts Organizer

Vulnerability:
Unauthenticated Arbitrary File Upload
Patched in Version:
3.0
Severity Score:
Critical
The vulnerability has been patched, so you should update to version 3.0.

WordPress Plugin Vulnerabilities – No Known Fix

This section contains plugin vulnerabilities with no known fix. Until a patch is available, immediately uninstall and delete the plugin.

CallRail Phone Call Tracking

Installations:
20,000+
Vulnerability:
Stored XSS via CSRF
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched. You should deactivate the plugin.

MP3 jPlayer

Vulnerability:
Multiple CSRF
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.
Vulnerability:
Admin+ Stored Cross-Site Scripting
Patched in Version:
No Fix
Severity Score:
Low
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Ketchup Restaurant Reservations

Vulnerability:
Unauthenticated Stored XSS; Unauthenticated Blind SQLi
Patched in Version:
No Fix
Severity Score:
High
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Easy Org Chart

Vulnerability:
Contributor+ Stored Cross-Site Scripting
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Bitcoin / Altcoin Faucet

Vulnerability:
Settings Update to Stored XSS via CSRF
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

Login Block IPs

Vulnerability:
Arbitrary Setting Update via CSRF
Patched in Version:
No Fix
Severity Score:
Medium
The vulnerability has not been patched and the plugin is closed. You should uninstall and delete the plugin.

WordPress Theme Vulnerabilities

In this section, the latest WordPress theme vulnerabilities have been disclosed. Each theme listing includes the type of vulnerability, the active installations, the version number if patched, and the severity rating.

No new WordPress theme vulnerabilities were disclosed this week.

Try it, Free! Passkeys + Biometric Logins for WordPress

The easiest and most secure way to log in to your WordPress site is here and ready for you to test! iThemes Security Pro has added biometric logins (like Face ID, Touch ID, and Windows Hello) and passkey technology supported by all major browsers, including Chrome, Firefox, and Safari. Now website admins and end users can have secure logins without the inconvenience of additional two-factor apps, password managers, or complex password requirements.

We need your help testing this release candidate of iThemes Security Pro. Your testing and feedback will help us fine-tune this release so passkeys are easy for everyone to set up and use. Learn more about the testing process here to get a free sandbox site.

All current customers of iThemes Security Pro, the Essentials Bundle, the Plugin Suite, and the WordPress Web Designer’s Toolkit will get instant access to Biometric Logins + Passkeys when it launches this month!

Solid Security is part of Solid Suite — The best foundation for WordPress websites.

Every WordPress site needs security, backups, and management tools. That’s Solid Suite — an integrated bundle of three plugins: Solid Security, Solid Backups, and Solid Central. You also get access to Solid Academy’s learning resources for WordPress professionals. Build your next WordPress website on a solid foundation with Solid Suite!

Get Solid Security

Did you like this article? Spread the word: