Menu
iThemes
WordPress Backup, Security & Maintenance
  • Products
    • iThemes Security Pro
    • BackupBuddy
    • Kadence WP
    • Restrict Content Pro
    • iThemes Sync
    • Why buy from iThemes?
  • Bundles
    • Essentials Bundle
    • Plugin Suite
    • WordPress Web Designer’s Toolkit
    • Customer Spotlights
  • Resources
    • Blog
    • WordPress 101 Tutorials
    • WordPress Ebooks
    • Weekly WordPress Vulnerability Report
    • The Ultimate Guide to Starting a Web Design Business
  • Training
    • Upcoming Webinars
    • Free Webinar Library
    • Premium Courses
    • Become a Member
    • Member Login
  • Support
    • Documentation
    • Get Help
    • Product Updates
    • Upgrade Policy
    • Contact
    • Our Mission: Make People’s Lives Awesome
  • Log In
WordPress News and Updates from iThemes
Categories
  • Product Updates
  • WordPress Backup
  • WordPress Block Editor
  • WordPress Ecommerce
  • WordPress for Freelancers
  • WordPress Maintenance
  • WordPress Security
  • WordPress Training Webinars
  • WordPress Tutorials
  • WPprosper

WordPress Vulnerability Roundup: May 2020, Part 2

Written by Michael Moore on May 27, 2020

Last Updated on August 17, 2020

New WordPress plugin and theme vulnerabilities were disclosed during the second half of May, so we want to keep you aware. In this post, we cover recent WordPress plugin, theme and core vulnerabilities and what to do if you are running one of the vulnerable plugins or themes on your website.

New WordPress plugin and theme vulnerabilities were disclosed during the second half of April, so we want to keep you aware. In this post, we cover recent WordPress plugin, theme and core vulnerabilities and what to do if you are running one of the vulnerable plugins or themes on your website.

The WordPress Vulnerability Roundup is divided into four different categories:

  1. WordPress core
  2. WordPress plugins
  3. WordPress themes

Each vulnerability will have a threat rating of Low, Medium, High, or Critical.

WordPress Core Vulnerabilities

There have not been any WordPress vulnerabilities disclosed in May 2020.

WordPress Plugin Vulnerabilities

Several new WordPress plugin vulnerabilities have been discovered this month so far. Make sure to follow the suggested action below to update the plugin or completely uninstall it.

1. Site Kit by Google – Critical

Site Kit by Google versions below 1.8.0 have a Privilege Escalation vulnerability that will allow an an attacker to become a Search Console owner.

The vulnerability is patched, and you should update to version 1.8.0.

2. Easy Testimonials – Critical

Easy Testimonials versions below 3.6 have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 3.6.

3. WP Product Review – High

WP Product Review versions below 3.7.6 have an Unauthenticated Stored Cross-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 3.7.6.

4. Login/Signup Popup – Critical

Login/Signup Popup versions below 1.5 have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 1.5.

5. Photo Gallery by 10Web – Critical

Photo Gallery by 10Web versions below 1.5.55 have an Unauthenticated SQL Injection vulnerability.

The vulnerability is patched, and you should update to version 1.5.55.

6. Team Members – Critical

Team Members versions below 5.0.4 have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 5.0.4.

7. Visual Composer Website Builder – High

Visual Composer Website Builder versions below 27.0 have multiple Authenticated Cross-Site Scripting vulnerabilities.

The vulnerability is patched, and you should update to version 27.0.

8. WordPress Infinite Scroll – Critical

WordPress Infinite Scroll versions below 5.3.2 have an Authenticated SQL Injection vulnerability.

The vulnerability is patched, and you should update to version 5.3.2.

9. WP Frontend Profile – Low

WP Frontend Profile versions below 1.2.2 have a Cross Site Request Forgery vulnerability.

The vulnerability is patched, and you should update to version 1.2.2.

10. Paid Memberships Pro – Medium

paid membership pro logo

Paid Memberships Pro versions below 2.3.3 have an Authenticated SQL Injection vulnerability.

The vulnerability is patched, and you should update to version 2.3.3.

11. ThirstyAffiliates Affiliate Link Manager – Medium

ThirstyAffiliates Affiliate Link Manager versions below 3.9.3 have an Authenticated Stored Criss-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 3.9.3.

12. Official MailerLite Sign Up Forms – Critical

Official MailerLite Sign Up Forms versions below 1.4.5 have Multiple CSRF vulnerabilities.

The vulnerability is patched, and you should update to version 1.4.5.

13. Add-on SweetAlert Contact Form 7 – Low

Add-on SweetAlert Contact Form 7 versions below 1.0.8 have an Authenticated Stored Cross-Site Scripting vulnerability.

The vulnerability is patched, and you should update to version 1.0.8.

14. Form Maker by 10Web – High

Form Maker by 10Web versions below have 1.13.36 an Authenticated SQL Injection vulnerability.

The vulnerability is patched, and you should update to version 1.13.36.

WordPress Themes

There have been no disclosed WordPress Theme vulnerabilities in the second half of may.

How to Be Proactive About WordPress Theme & Plugin Vulnerabilities

Running outdated software is the number one reason WordPress sites are hacked. It is crucial to the security of your WordPress site that you have an update routine. You should be logging into your sites at least once a week to perform updates.

Automatic Updates Can Help

Automatic updates are a great choice for WordPress websites that don’t change very often. Lack of attention often leaves these sites neglected and vulnerable to attacks. Even with recommended security settings, running vulnerable software on your site can give an attacker an entry point into your site.

Using the iThemes Security Pro plugin’s Version Management feature, you can enable automatic WordPress updates to ensure you are getting the latest security patches. These settings help protect your site with options to automatically update to new versions or to increase user security when the site’s software is outdated.

Version Management Update Options
  • WordPress Updates –Automatically install the latest WordPress release.
  • Plugin Automatic Updates – Automatically install the latest plugin updates. This should be enabled unless you actively maintain this site on a daily basis and install the updates manually shortly after they are released.
  • Theme Automatic Updates – Automatically install the latest theme updates. This should be enabled unless your theme has file customizations.
  • Granular Control over Plugin and Theme updates – You may have plugins/themes that you’d like to either manually update, or delay the update until the release has had time to prove stable. You can choose Custom for the opportunity to assign each plugin or theme to either update immediately (Enable), not update automatically at all (Disable) or update with a delay of a specified amount of days (Delay).
Strengthening and Alerting to Critical Issues
  • Strengthen Site When Running Outdated Software – Automatically add extra protections to the site when an available update has not been installed for a month. The iThemes Security plugin will automatically enable stricter security when an update has not been installed for a month. First, it will force all users that do not have two-factor enabled to provide a login code sent to their email address before logging back in. Second, it will disable the WP File Editor (to block people from editing plugin or theme code), XML-RPC pingbacks, and block multiple authentication attempts per XML-RPC request (both of which will make XML-RPC stronger against attacks without having to turn it off completely).
  • Scan for Other Old WordPress Sites – This will checks for other outdated WordPress installs on your hosting account. A single outdated WordPress site with a vulnerability could allow attackers to compromise all the other sites on the same hosting account.
  • Send Email Notifications – For issues that require intervention, an email is sent to admin-level users.

Managing Multiple WP Sites? Update Plugins, Themes & Core At Once from the iThemes Sync Dashboard

iThemes Sync is our central dashboard to help you manage multiple WordPress sites. From the Sync dashboard, you can view available updates for all your sites and then update plugins, themes, and WordPress core with one click. You can also get daily email notifications when a new version update is available.

Try Sync Free for 30 Days

A WordPress Security Plugin Can Help Secure Your Website

iThemes Security Pro, our WordPress security plugin, offers 30+ ways to secure and protect your website from common WordPress security vulnerabilities. With WordPress, two-factor authentication, brute force protection, strong password enforcement, and more, you can add an extra layer of security to your website.

Learn more about WordPress security with 10 key tips. Download the ebook now: A Guide to WordPress Security
Download now

Share via:

  • Facebook
  • Twitter
  • LinkedIn
  • More
Other related posts
WordPress Vulnerability Report
WordPress Vulnerability Report – May 25, 2022
wordpress vulnerability report
WordPress Vulnerability Report – May 18, 2022
wordpress-vulnerability-report
WordPress Vulnerability Report – May 11, 2022

WordPress Vulnerability Report – May 4, 2022

Comments

  1. Vernessa Taylor says:
    May 28, 2020 at 4:10 pm

    As of the time of this comment, the Official MailerLite Signup Forms plugin does not appear to be closed on WordPress.org pending review. The download button is still active.

    Reply
    • Michael Moore says:
      June 1, 2020 at 12:49 pm

      Hi Vanessa,

      I updated the post to reflect that Official MailerLite Signup Forms released a security fix.

      Thanks!
      Michael

      Reply
  2. Lynn Villeneuve says:
    May 30, 2020 at 9:36 am

    Hi there,

    Many thanks for all the vulnerability information you provide. I wonder if you could clarify the details you provided about Form Maker by 10Web. You indicated that it was closed on wordpress.org pending review. I just went to wodpress.org and that plugin is still listed in the plugin directory and there are no warnings. Has the plugin issue been resolved? Should I still remove the plugin?

    Thanks in advance for any further info you can provide.

    Reply
    • Michael Moore says:
      June 1, 2020 at 12:49 pm

      Hi Lynn,

      I updated the post to reflect that Form Maker by 10Web released a security fix.

      Thanks!
      Michael

      Reply

Respond

Click here to cancel reply.

Get updates on new themes & plugins plus special discounts

About iThemes

  • The Team
  • Contact Us
  • Website Accessibility Statement
  • Sitemap

Resources

  • Blog
  • Documentation
  • WordPress Tutorials
  • Free WordPress Ebooks
  • Free Webinar Library
  • Free Upcoming Webinars
  • iThemes Training
  • Affiliates

Customers

  • Member Panel Login
  • Support
  • FAQs
  • Upgrade Policy
  • Licensing
  • Terms and Conditions
  • Refund Policy

Top Products

  • BackupBuddy
  • iThemes Security Pro
  • iThemes Sync
  • Restrict Content Pro
  • WPComplete
  • WordPress Hosting
  • WordPress Plugins
  • Content Upgrades
  • WordPress Landing Page Plugin
  • BackupBuddy Stash

iThemes Media LLC Copyright © 2022 All rights reserved | Privacy Policy

© 2022 All Rights Reserved.

Share via
Facebook
Twitter
LinkedIn
Mix
Email
Print
Copy Link
Powered by Social Snap
Copy link
CopyCopied
Powered by Social Snap

Get the Ebook: A Guide to WordPress Security

WordPress security guide
In this downloadable guide, we walk through 10 tips for better WordPress security.

  • The different types of WordPress security vulnerabilities
  • Common mistakes users and admins make
  • WordPress security best practices
  • Actions you can take today to reduce your risk of a hack or breach
No spam. Unsubscribe anytime.