WordPress Vulnerability Report

WordPress Vulnerability Roundup: February 2020, Part 2

New WordPress plugin and theme vulnerabilities were disclosed during the second half of February, so we want to keep you aware. In this post, we cover recent WordPress plugin, theme and core vulnerabilities and what to do if you are running one of the vulnerable plugins or themes on your website.

Avatar photo
SolidWP Editorial Team

New WordPress plugin and theme vulnerabilities were disclosed during the second half of February, so we want to keep you aware. In this post, we cover recent WordPress plugin, theme and core vulnerabilities and what to do if you are running one of the vulnerable plugins or themes on your website.

The WordPress Vulnerability Roundup is divided into four different categories:

  1. WordPress core
  2. WordPress plugins
  3. WordPress themes

WordPress Core Vulnerabilities

There haven’t been any disclosed WordPress vulnerabilities in 2020.

WordPress Plugin Vulnerabilities

Several new WordPress plugin vulnerabilities have been discovered this month so far. Make sure to follow the suggested action below to update the plugin or completely uninstall it.

1. Ninja Forms

Ninja Form version 3.4.22.1 and below have multiple Authenticated Stored Cross-Site Scripting vulnerabilities.

The vulnerabilities have been patched, and you should update to version 3.4.23.

2. ThemeGrill Demo Importer

Theme Grill Demo Importer versions 1.6.1 and below have a vulnerability that would allow an Unauthenticated user to wipe the entire database.

The vulnerability has been patched, and you should update to version 1.6.2.

3. SAML SP Single Sign On

SAML SP Single Sign On versions 4.8.83 and below are vulnerable to a Cross-Site Scripting attack.

The vulnerability has been patched, and you should update to version 4.8.84.

4. wpCentral

wpCentral versions 1.5.1 and below have an Improper Access Control to Privilege Escalation vulnerability.

The vulnerability has been patched, and you should update to version 1.5.2.

5. ThemeREX Addons

ThemRex Addons versions 1.6.50 and higher have a Remote Code Execution vulnerability that is being actively exploited.

Remove the plugin until a patch is released.

Modula Image Gallery versions 2.2.4 and below have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability has been patched, and you should update to version 2.2.5.

7. Duplicator

Duplicator versions 1.3.26 and below have Unauthenticated Arbitrary File Download vulnerability.

The vulnerability has been patched, and you should update to version 1.3.28.

8. Chained Quiz

Chained Quiz by Kiboko Labs versions 1.1.9 and below have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability has been patched, and you should update to version 1.1.9.1.

9. RegistrationMagic

RegistrationMagic versions 4.6.0.1 and below have multiple Cross-Site Scripting vulnerabilities and an Authenticated SQL Injection vulnerability.

The vulnerabilities have been patched, and you should update to version 4.6.0.3.

10. Ultimate Membership Pro

Ultimate Membership Pro below version 8.7 have Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities.

The vulnerability has been patched, and you should update to version 8.7.

Photo Gallery versions 1.5.45 and below have multiple Cross-Site Scripting vulnerabilities.

The vulnerability has been patched, and you should update to version 1.5.46.

Envira Photo Gallery versions 1.7.6 and below have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability has been patched, and you should update to version 1.7.7.

13. iThemes Sync Pro

iThemes Sync Pro versions 2.1.3 and below are missing a nonce in an authentication request.

The vulnerability has been patched, and you should update to version 2.1.3

WordPress Themes

1. Fruitful

Fruitful theme versions 3.8 and below are vulnerable to an Unauthenticated Reflected Cross-Site Scripting attack.

Remove the theme.The vulernability has been reported without a response from the theme developer.

How to Be Proactive About WordPress Theme & Plugin Vulnerabilities

Running outdated software is the number one reason WordPress sites are hacked. It is crucial to the security of your WordPress site that you have an update routine. You should be logging into your sites at least once a week to perform updates.

Automatic Updates Can Help

Automatic updates are a great choice for WordPress websites that don’t change very often. Lack of attention often leaves these sites neglected and vulnerable to attacks. Even with recommended security settings, running vulnerable software on your site can give an attacker an entry point into your site.

Using the iThemes Security Pro plugin’s Version Management feature, you can enable automatic WordPress updates to ensure you are getting the latest security patches. These settings help protect your site with options to automatically update to new versions or to increase user security when the site’s software is outdated.

Version Management Update Options
  • WordPress Updates –Automatically install the latest WordPress release.
  • Plugin Automatic Updates – Automatically install the latest plugin updates. This should be enabled unless you actively maintain this site on a daily basis and install the updates manually shortly after they are released.
  • Theme Automatic Updates – Automatically install the latest theme updates. This should be enabled unless your theme has file customizations.
  • Granular Control over Plugin and Theme updates – You may have plugins/themes that you’d like to either manually update, or delay the update until the release has had time to prove stable. You can choose Custom for the opportunity to assign each plugin or theme to either update immediately (Enable), not update automatically at all (Disable) or update with a delay of a specified amount of days (Delay).
Strengthening and Alerting to Critical Issues
  • Strengthen Site When Running Outdated Software – Automatically add extra protections to the site when an available update has not been installed for a month. The iThemes Security plugin will automatically enable stricter security when an update has not been installed for a month. First, it will force all users that do not have two-factor enabled to provide a login code sent to their email address before logging back in. Second, it will disable the WP File Editor (to block people from editing plugin or theme code), XML-RPC pingbacks, and block multiple authentication attempts per XML-RPC request (both of which will make XML-RPC stronger against attacks without having to turn it off completely).
  • Scan for Other Old WordPress Sites – This will checks for other outdated WordPress installs on your hosting account. A single outdated WordPress site with a vulnerability could allow attackers to compromise all the other sites on the same hosting account.
  • Send Email Notifications – For issues that require intervention, an email is sent to admin-level users.

Managing Multiple WP Sites? Update Plugins, Themes & Core At Once from the iThemes Sync Dashboard

iThemes Sync is our central dashboard to help you manage multiple WordPress sites. From the Sync dashboard, you can view available updates for all your sites and then update plugins, themes, and WordPress core with one click. You can also get daily email notifications when a new version update is available.

Try Sync FREE for 30 daysLearn more

A WordPress Security Plugin Can Help Secure Your Website

iThemes Security Pro, our WordPress security plugin, offers 30+ ways to secure and protect your website from common WordPress security vulnerabilities. With WordPress, two-factor authentication, brute force protection, strong password enforcement, and more, you can add an extra layer of security to your website.

[content_upgrade cu_id=”50951″]Learn more about WordPress security with 10 key tips. Download the ebook now: A Guide to WordPress Security[content_upgrade_button]Download now[/content_upgrade_button][/content_upgrade]

Did you like this article? Spread the word: