New WordPress plugin and theme vulnerabilities were disclosed during the first half of February. This post covers the recent WordPress plugin, theme, and core vulnerabilities and what to do if you run one of the vulnerable plugins or themes on your website.
The WordPress Vulnerability Roundup is divided into three different categories: WordPress core, WordPress plugins, and WordPress themes.
Each vulnerability will have a severity rating of Low, Medium, High, or Critical. The severity ratings are based on the Common Vulnerability Scoring System.
WordPress Core Vulnerabilities
WordPress Plugin Vulnerabilities
1. uListing – Critical
uListing versions below 1.7 have multiple vulnerabilities, including Unauthenticated SQL Injections, Unauthenticated Arbitrary Account Creation, and Unauthenticated WordPress Options Change.
2. Super Forms – Critical
Super Forms versions below 4.9.703 have an Unauthenticated PHP File Upload to RCE vulnerability.
3. Modern Events Calendar Lite – Critical
Modern Events Calendar Lite versions below 5.16.5 have multiple issues, including an Authenticated Arbitrary File Upload leading to Remote Code Execution vulnerability.
4. Ivory Search – Medium
Ivory Search versions below 4.5.11 have an Authenticated Reflected Cross-Site Scripting vulnerability.
5. WP Editor – Critical
WP Editor versions below 1.2.7 have an Authenticated SQL Injection vulnerability.
6. MStore API – High
MStore API versions below 3.2.0 have an Authentication Bypass With Sign In With Apple vulnerability.
7. Popup Builder – Medium
Popup Builder versions below 3.74 have an Authenticated Reflected Cross-Site Scripting vulnerability.
8. Gift Voucher – Critical
All versions of Gift Voucher have an Unauthenticated Blind SQL Injection vulnerability.
9. Name Directory – Medium
Name Directory versions below 1.18 have a Cross-Site Request Forgery vulnerability.
10. Contact Form 7 Style – High
All versions of Contact Form 7 Style have Cross-Site Request Forgery to Stored Cross-Site Scripting vulnerability.
11. Ultimate GDPR & CCPA Compliance Toolkit – Critical
Ultimate GDPR & CCPA Compliance Toolkit versions below 2.5 Unauthenticated Plugin Settings Export and Import leading to a Malicious Redirect vulnerability.
12. Like Button Rating ? LikeBtn – High
Like Button Rating ? LikeBtn versions below 2.6.32 have an Unauthenticated Arbitrary Blog Settings Change and an Unauthenticated Full-Read SSRF vulnerabilities.
13. Paid Membership Pro – Medium
Paid Membership Pro versions below 2.5.3 have an Authentication Bypass vulnerability leading to Unauthorized Order Information Disclosure.
14. Backup by Supsystic – Critical
All versions of Backup by Supsystic have a Local File Inclusion vulnerability.
15. Contact Form by Supsystic – Critical
All versions of Contact Form by Supsystic have an Authenticated SQL Injection vulnerability.
16. Data Tables Generator by Supsystic – Critical
All versions of Data Tables Generator by Supsystic by Supsystic have an Authenticated SQL Injection vulnerability.
17. Digital Publications by Supsystic – Medium
All versions of Digital Publications by Supsystic have an Authenticated Stored Cross-Site Scripting vulnerability.
18. Membership by Supsystic – Critical
All versions of Membership by Supsystic have an Authenticated SQL Injection vulnerability.
19. Newsletter by Supsystic – Critical
All versions of Newsletter by Supsystic have an Authenticated SQL Injection vulnerability.
20. Pricing Table by Supsystic – Critical
All versions of Pricing Table by Supsystic have an Authenticated SQL Injection vulnerability.
21. Ultimate Maps by Supsystic – Critical
All versions of have an Ultimate Maps by Supsystic Authenticated SQL Injection vulnerability.
22. NextGen Gallery – Critical
NextGen Gallery versions below 3.5.0 have CSRF, File Upload, Stored XSS, and RCE vulnerabilities.
23. Map Block for Google Maps – Medium
Map Block for Google Maps versions below 1.32 have a Broken Access Control vulnerability leading to an Unauthorized Google API Key change.
WordPress Theme Vulnerabilities
1. Wyzi – Medium
Wyzi versions below 2.4.3 have Reflected Cross-Site Scripting vulnerability.
2. Multiple Parallelus Themes – Medium
Multiple Parallelus Themes versions below 2.0 have a Reflected Cross-Site Scripting vulnerability.
February Security Tip: Why You Should Be Logging Website Security Activity
Security logging should be an essential part of your WordPress security strategy. Why?
Insufficient logging and monitoring can lead to a delay in the detection of a security breach. Most breach studies show that the time to detect a breach is over 200 days!
That amount of time allows an attacker to breach other systems, modify, steal, or destroy more data. For this reason, “insufficient logging” landed on the OWASP top 10 of web application security risks.
WordPress security logs have several benefits in your overall security strategy, helping you:
- Identity and stop malicious behavior.
- Spot activity that can alert you of a breach.
- Assess how much damage was done.
- Aid in the repair of a hacked site.
If your site does get hacked, you will want to have the best information to aid in a quick investigation and recovery.
The good news is that iThemes Security Pro can help you implement website logging. iThemes Security Pro’s WordPress security logs tracks all these website activities for you:
Stats from your logs are then displayed in a real-time WordPress security dashboard that you can view from your WordPress admin dashboard.
Check out this feature spotlight post where we unpack all the steps of adding WordPress security logs to your website using iThemes Security Pro.
See how it works
A WordPress Security Plugin Can Help Secure Your Website
iThemes Security Pro, our WordPress security plugin, offers 50+ ways to secure and protect your website from common WordPress security vulnerabilities. With WordPress, two-factor authentication, brute force protection, strong password enforcement, and more, you can add an extra layer of security to your website.
Get iThemes Security Pro
The post WordPress Vulnerability Roundup: February 2021, Part 1 appeared first on iThemes.
Source: Security Feed