{"id":162352,"date":"2024-07-08T11:29:39","date_gmt":"2024-07-08T10:29:39","guid":{"rendered":"https:\/\/getshieldsecurity.com\/?p=162352"},"modified":"2024-07-08T11:49:27","modified_gmt":"2024-07-08T10:49:27","slug":"shieldnotes-ep21","status":"publish","type":"post","link":"https:\/\/getshieldsecurity.com\/blog\/shieldnotes-ep21\/","title":{"rendered":"ShieldNOTES Ep#21: New Supply Chain Attack; Elementor Addon &amp; WP Google Map Vulnerabilities; Hacker Security Guide"},"content":{"rendered":"\n<p>There&#8217;s another supply chain attack with WP.org plugins affected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#1 &#8211; Vulnerable: Nested Pages Plugin<\/h2>\n\n\n\n<p>CSRF with 100,000 installs.<\/p>\n\n\n\n<p><strong>How will I know I&#8217;m okay?<\/strong><br>Upgrade ASAP to v3.2.8+<\/p>\n\n\n\n<p><strong>What&#8217;s the risk?<\/strong><br>Severity risk <strong>8.3<\/strong>\/10 &#8211; an attacker can force privileged users to execute unwanted actions while authenticated.<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>Please use <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade feature<\/a> for vulnerable plugins.<\/p>\n\n\n\n<p><a href=\"https:\/\/patchstack.com\/database\/vulnerability\/wp-nested-pages\/wordpress-nested-pages-plugin-3-2-7-cross-site-request-forgery-to-local-file-inclusion-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#2 &#8211; Vulnerable: Ultimate Addons for Elementor Plugin<\/h2>\n\n\n\n<p>Widely used plugin with a critical Privilege Escalation vulnerability.<\/p>\n\n\n\n<p><strong>How will I know I&#8217;m okay?<\/strong><br>Upgrade ASAP to v1.36.32+<\/p>\n\n\n\n<p><strong>What&#8217;s the risk?<\/strong><br>Severity risk <strong>8.8<\/strong>\/10 &#8211; an attacker can escalate their low-privileged account to gain higher privileges and take full control of the website.<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>Please use <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade feature<\/a> for vulnerable plugins.<\/p>\n\n\n\n<p><a href=\"https:\/\/patchstack.com\/database\/vulnerability\/ultimate-elementor\/wordpress-ultimate-addons-for-elementor-plugin-1-36-31-privilege-escalation-vulnerability\" data-type=\"link\" data-id=\"https:\/\/patchstack.com\/database\/vulnerability\/ultimate-elementor\/wordpress-ultimate-addons-for-elementor-plugin-1-36-31-privilege-escalation-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3 &#8211; Vulnerable: WP Google Map Plugin<\/h2>\n\n\n\n<p>Potentially 300,000 WP sites with severe security risk.<\/p>\n\n\n\n<p><strong>How will I know I&#8217;m okay?<\/strong><br>Upgrade ASAP to v4.6.2+<\/p>\n\n\n\n<p><strong>What&#8217;s the risk?<\/strong><br>Severity risk <strong>8.5<\/strong>\/10 &#8211; SQL Injection &#8211; an attacker can interact with your WP database directly!<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>Please use <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade feature<\/a> for vulnerable plugins.<\/p>\n\n\n\n<p><a href=\"https:\/\/patchstack.com\/database\/vulnerability\/wp-google-map-plugin\/wordpress-wordpress-plugin-for-google-maps-plugin-4-6-1-authenticated-contributor-sql-injection-vulnerability\" data-type=\"link\" data-id=\"https:\/\/patchstack.com\/database\/vulnerability\/wp-google-map-plugin\/wordpress-wordpress-plugin-for-google-maps-plugin-4-6-1-authenticated-contributor-sql-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#4 &#8211; Vulnerable: UsersWP Plugin<\/h2>\n\n\n\n<p>Not a hugely popular plugin, but it poses a high risk.<\/p>\n\n\n\n<p><strong>How will I know I&#8217;m okay?<\/strong><br>Upgrade ASAP to v1.2.11+<\/p>\n\n\n\n<p><strong>What&#8217;s the risk?<\/strong><br>Severity risk <strong>9.3<\/strong>\/10 &#8211; SQL Injection &#8211; an attacker can interact with your WP database directly!<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>Please use <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-plugin-vulnerability-scanner\/\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade feature<\/a> for vulnerable plugins.<\/p>\n\n\n\n<p><a href=\"https:\/\/patchstack.com\/database\/vulnerability\/userswp\/wordpress-userswp-plugin-1-2-10-unauthenticated-sql-injection-via-uwp-sort-by-vulnerability\" data-type=\"link\" data-id=\"https:\/\/patchstack.com\/database\/vulnerability\/userswp\/wordpress-userswp-plugin-1-2-10-unauthenticated-sql-injection-via-uwp-sort-by-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#5 &#8211; Plugins Affected by Polyfill Supply Chain Attack<\/h2>\n\n\n\n<p>Polyfill.js &#8211; a widely used JavaScript library &#8211; has been exploited by hackers with malicious code that can lead to Cross-Site Scripting (XSS) risk and steal user data, manipulate site actions, and redirect visitors to malicious sites.<\/p>\n\n\n\n<p>These plugins below are known to embed scripts from the affected domains and should be updated to the latest version or removed:<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/wordpress.org\/plugins\/ameliabooking\/\" data-type=\"link\" data-id=\"https:\/\/wordpress.org\/plugins\/ameliabooking\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amelia<\/a><\/strong><br>No official fix available. Remove it for now.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/wordpress.org\/plugins\/wp-user-frontend\/\" data-type=\"link\" data-id=\"https:\/\/wordpress.org\/plugins\/wp-user-frontend\/\" target=\"_blank\" rel=\"noreferrer noopener\">WP User Frontend<\/a><\/strong><br>Upgrade to v4.0.8+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/wordpress.org\/plugins\/wc-product-customer-list\/\" data-type=\"link\" data-id=\"https:\/\/wordpress.org\/plugins\/wc-product-customer-list\/\" target=\"_blank\" rel=\"noreferrer noopener\">Product Customer List for WooCommerce<\/a><\/strong><br>Upgrade to v3.1.7+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>As a precautionary measure, take a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a review of your sites<\/a> to catch issues early.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#6 &#8211; From our blog: Secure your site from hackers<\/h2>\n\n\n\n<p>Bad guys never sleep, and neither should we. We guide you through easy steps to defend your site and keep it secure.<\/p>\n\n\n\n<p><a href=\"https:\/\/getshieldsecurity.com\/blog\/secure-wordpress-site-from-hackers\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/secure-wordpress-site-from-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<p>Thanks for reading, and have a great week!<\/p>\n\n\n\n<p><strong>Paul Goodchild<\/strong><br><em>Shield Security for WordPress<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s another supply chain attack with WP.org plugins affected.<\/p>\n","protected":false},"author":27,"featured_media":161171,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[153,201],"tags":[69],"class_list":["post-162352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-wordpress-solutions","category-shieldnotes","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/162352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/comments?post=162352"}],"version-history":[{"count":5,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/162352\/revisions"}],"predecessor-version":[{"id":162360,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/162352\/revisions\/162360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media\/161171"}],"wp:attachment":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media?parent=162352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/categories?post=162352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/tags?post=162352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}