{"id":166306,"date":"2024-12-16T13:40:09","date_gmt":"2024-12-16T13:40:09","guid":{"rendered":"https:\/\/getshieldsecurity.com\/?p=166306"},"modified":"2024-12-16T13:48:29","modified_gmt":"2024-12-16T13:48:29","slug":"shieldnotes-45","status":"publish","type":"post","link":"https:\/\/getshieldsecurity.com\/blog\/shieldnotes-45\/","title":{"rendered":"A big week for vulnerabilities; REST API Security Tips; &amp; ShieldPRO 20.1 Released"},"content":{"rendered":"\n<p>This is a big week for vulnerabilities. Several popular form plugins are hit by quite serious vulnerabilities, and there&#8217;s a privilege escalation risk with the MainWP client plugin.<\/p>\n\n\n\n<p>It&#8217;s hard to imagine that there&#8217;s anyone out there not affected by at least 1 vulnerability this week.<\/p>\n\n\n\n<p>I&#8217;d also like to draw your attention to our latest ShieldPRO release, v20.1 (see more below)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#1 &#8211; Security Risks in Popular Plugins<\/h2>\n\n\n\n<p>These are widely used plugins with security threats, led by WPForms, affecting 6+ million sites.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/wpforms-lite\/vulnerability\/wordpress-wpforms-plugin-1-8-4-1-9-2-1-missing-authorization-to-authenticated-subscriber-payment-refund-and-subscription-cancellation-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Contact Form by WPForms Plugin<\/a><\/strong><br>Broken Access Control; 8.5\/10; Update to v1.9.2.2+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/mainwp-child\/vulnerability\/wordpress-mainwp-child-plugin-5-2-missing-authorization-to-unauthenticated-privilege-escalation-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">MainWP Child Plugin<\/a><\/strong><br>Privilege Escalation; 8.1\/10; Update to v5.3+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/foogallery-premium\/vulnerability\/wordpress-foogallery-plugin-2-4-16-authenticated-contributor-directory-traversal-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">FooGallery Premium Plugin<\/a><\/strong><br>Directory Traversal; 7.7\/10; Update to v2.4.27+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/ninja-forms\/vulnerability\/wordpress-ninja-forms-plugin-3-8-19-unauthenticated-stored-cross-site-scripting-via-form-calculations-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Ninja Forms Plugin<\/a><\/strong><br>XSS; 7.1\/10; Update to v3.8.20+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/unlimited-elements-for-elementor\/vulnerability\/wordpress-unlimited-elements-for-elementor-free-widgets-addons-templates-plugin-1-5-126-authenticated-contributor-stored-cross-site-scripting-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Unlimited Elements For Elementor (Free Widgets, Addons, Templates) Plugin<\/a><\/strong><br>XSS; 6.5\/10; Update to v1.5.127+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/beaver-builder-lite-version\/vulnerability\/wordpress-beaver-builder-wordpress-page-builder-plugin-2-8-4-4-authenticated-contributor-stored-cross-site-scripting-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Beaver Builder Plugin<\/a><\/strong><br>XSS; 6.5\/10; Update to v2.8.5.3+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/wp-user-avatar\/vulnerability\/wordpress-profilepress-plugin-4-15-15-admin-stored-xss-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">ProfilePress Plugin<\/a><\/strong><br>XSS; 5.9\/10; Update to v4.15.15+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/popup-builder\/vulnerability\/wordpress-popup-builder-plugin-4-3-5-admin-stored-xss-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Popup Builder Plugin<\/a><\/strong><br>XSS; 5.9\/10; Update to v4.3.5+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/luckywp-table-of-contents\/vulnerability\/wordpress-luckywp-table-of-contents-plugin-2-1-7-admin-stored-xss-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">LuckyWP Table of Contents Plugin<\/a><\/strong><br>XSS; 5.9\/10; Update to v2.1.7+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/the-events-calendar\/vulnerability\/wordpress-the-events-calendar-plugin-6-8-2-1-unauthenticated-password-protected-event-disclosure-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">The Events Calendar Plugin<\/a><\/strong><br>Broken Access Control; 5.3\/10; Update to v6.8.2.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/members\/vulnerability\/wordpress-members-plugin-3-2-10-unauthenticated-content-restriction-bypass-to-sensitive-information-exposure-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Members Plugin<\/a><\/strong><br>Sensitive Data Exposure; 5.3\/10; Update to v3.2.11+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#2 &#8211; High Security Risks in Less Popular Plugins &amp; Themes<\/h2>\n\n\n\n<p>These plugins and theme, despite limited use, pose extreme risks\u20142 most critical with no-fix and removed from wp.org<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/indeed-wp-superbackup\/vulnerability\/wordpress-superbackup-plugin-2-3-3-unauthenticated-arbitrary-file-upload-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">WP SuperBackup Plugin<\/a><\/strong><br>Arbitrary File Upload; <strong>10<\/strong>\/10; Update to v2.4+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/halfdata-optin-downloads\/vulnerability\/wordpress-opt-in-downloads-plugin-4-07-authenticated-subscriber-arbitrary-file-upload-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Opt-In Downloads Plugin<\/a><\/strong><br>Arbitrary File Upload; <strong>9.9<\/strong>\/10; Removed from wp.org; No fix; Remove\/or replace.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/theme\/woffice\/vulnerability\/wordpress-woffice-theme-5-4-14-unauthenticated-account-takeover-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Woffice Theme<\/a><\/strong><br>Broken Authentication; <strong>9.8<\/strong>\/10; Update to v5.4.15+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/wpscan.com\/blog\/unauthorized-plugin-installation-activation-in-hunk-companion\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hunk Companion Plugin<\/a><\/strong><br>Broken Access Control; <strong>9.8<\/strong>\/10; Update to v1.9.0+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/sign-in-with-google\/vulnerability\/wordpress-sign-in-with-google-plugin-1-8-0-authentication-bypass-in-authenticate-user-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Sign In With Google Plugin<\/a><\/strong><br>Broken Authentication; <strong>9.8<\/strong>\/10; Removed from wp.org; No fix; Remove\/or replace.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/responsive-filterable-portfolio\/vulnerability\/wordpress-responsive-filterable-portfolio-plugin-1-0-8-sql-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Responsive Filterable Portfolio Plugin<\/a><\/strong><br>SQL Injection; <strong>9.3<\/strong>\/10; Update to v1.0.9+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3 &#8211; Our blog: Proven Tips Securing Your WordPress REST API<\/h2>\n\n\n\n<p>WordPress REST APIs offer powerful functionality but come with security risks. Learn advanced techniques for securing APIs with strong authentication, access control, and protection against malicious traffic and code injection.<\/p>\n\n\n\n<p><a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-rest-api-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#4 &#8211; Shield Security 20.1 Released<\/h2>\n\n\n\n<p>With this release we&#8217;ve made further UI improvements and extended the coverage of the FileLocker feature to cover your critical theme&#8217;s <strong>functions <\/strong>file. There&#8217;s lots more to explore, and we advise all our members to upgrade asap!<\/p>\n\n\n\n<p><a href=\"https:\/\/clk.shldscrty.com\/shieldrelease201\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<p>Thanks for reading, and have a great week!<\/p>\n\n\n\n<p><strong>Paul Goodchild<\/strong><br><em>Shield Security for WordPress<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a big week for vulnerabilities. Several popular form plugins are hit by quite serious vulnerabilities, and there&#8217;s a priviledge escalation risk with the MainWP client plugin. It&#8217;s hard to imagine that there&#8217;s anyone out there not affected by at least 1 vulnerability this week. I&#8217;d also like to draw your attention to our latest ShieldPRO release, v20.1. <\/p>\n","protected":false},"author":27,"featured_media":163832,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[153,201],"tags":[69],"class_list":["post-166306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-wordpress-solutions","category-shieldnotes","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/166306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/comments?post=166306"}],"version-history":[{"count":7,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/166306\/revisions"}],"predecessor-version":[{"id":166313,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/166306\/revisions\/166313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media\/163832"}],"wp:attachment":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media?parent=166306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/categories?post=166306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/tags?post=166306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}