{"id":167145,"date":"2025-02-03T14:52:06","date_gmt":"2025-02-03T14:52:06","guid":{"rendered":"https:\/\/getshieldsecurity.com\/?p=167145"},"modified":"2025-02-03T14:52:07","modified_gmt":"2025-02-03T14:52:07","slug":"shieldnotes-51","status":"publish","type":"post","link":"https:\/\/getshieldsecurity.com\/blog\/shieldnotes-51\/","title":{"rendered":"Latest Vulnerabilities, WordPress Trends; &amp; Hints for a Spam-Free Contact Form 7"},"content":{"rendered":"\n<p>We bring the latest plugin security risks, including Elementor Pro and a recurring vulnerability in Ninja Forms.<\/p>\n\n\n\n<p>Hackers exploit outdated WordPress versions and plugins to spread malware. Plus, catch up on the new updates in the WordPress community and learn how to keep your Contact Form 7 spam-free, from our blog.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#1 &#8211; Security Risks in Popular Plugins<\/h2>\n\n\n\n<p>Lower severity but timely updates are key, as these plugins affect millions of sites.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/forminator\/vulnerability\/wordpress-forminator-plugin-1-38-2-reflected-cross-site-scripting-via-title-parameter-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Forminator Plugin<\/a><\/strong><br>XSS; 7.1\/10; Update to v1.38.3+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/elementskit\/vulnerability\/wordpress-elementskit-pro-plugin-3-7-8-authenticated-contributor-dom-based-stored-cross-site-scripting-via-url-parameter-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">ElementsKit Pro Plugin<\/a><\/strong><br>XSS; 6.5\/10; Update to v3.7.9+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/ninja-forms\/vulnerability\/wordpress-ninja-forms-plugin-3-8-24-authenticated-contributor-stored-cross-site-scripting-via-shortcode-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Ninja Forms Plugin<\/a><\/strong><br>XSS; 6.5\/10; Update to v3.8.25+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/tracking-code-manager\/vulnerability\/wordpress-tracking-code-manager-plugin-2-4-0-contributor-stored-xss-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Tracking Code Manager Plugin<\/a><\/strong><br>XSS; 6.5\/10; Update to v2.4.0+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/elementor-pro\/vulnerability\/wordpress-elementor-website-builder-pro-plugin-3-25-10-authenticated-contributor-sensitive-information-exposure-via-shortcode-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Elementor Pro Plugin<\/a><\/strong><br>Sensitive Data Exposure; 4.3\/10; Update to v3.25.11+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#2 &#8211; High Security Risks in Less Popular Plugins<\/h2>\n\n\n\n<p>Even less popular plugins, but with high-severity risks, like the ones below, can lead to major security issues.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/trx_addons\/vulnerability\/wordpress-themerex-addons-plugin-2-32-3-unauthenticated-arbitrary-file-upload-in-trx-addons-uploads-save-data-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">ThemeREX Addons Plugin<\/a><\/strong><br>Arbitrary File Upload; <strong>10<\/strong>\/10; Update to v2.34.0+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/userpro-mediamanager\/vulnerability\/wordpress-media-manager-for-userpro-plugin-3-12-0-missing-authorization-to-unauthenticated-arbitrary-options-update-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Media Manager for UserPro Plugin<\/a><\/strong><br>Broken Access Control; <strong>9.8<\/strong>\/10; No fix; Remove\/or replace.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/worpit-admin-dashboard-plugin\/vulnerability\/wordpress-icontrolwp-multiple-wordpress-site-manager-plugin-4-4-5-unauthenticated-php-object-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">iControlWP Plugin<\/a><\/strong><br>PHP Object Injection; <strong>9.8<\/strong>\/10; Update to v4.5.2+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/eventer\/vulnerability\/wordpress-eventer-plugin-3-9-8-unauthenticated-sql-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Eventer Plugin<\/a><\/strong><br>SQL Injection; <strong>9.3<\/strong>\/10; Update to v3.9.9+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/borderless\/vulnerability\/wordpress-borderless-plugin-1-5-9-authenticated-administrator-remote-code-execution-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Borderless Plugin<\/a><\/strong><br>RCE; <strong>9.1<\/strong>\/10; No fix; Remove\/or replace.<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3 &#8211; Hackers Target Outdated WordPress Versions and Plugins to Spread Malware<\/h2>\n\n\n\n<p>Hackers are exploiting outdated WordPress versions and plugins to infect thousands of sites, aiming to trick visitors into downloading malware. The malware steals personal information from both Windows and Mac users. The attack, still ongoing, redirects visitors to fake Chrome update pages that prompt them to download harmful files.<\/p>\n\n\n\n<p><a href=\"https:\/\/techcrunch.com\/2025\/01\/29\/hackers-are-hijacking-wordpress-sites-to-push-windows-and-mac-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#4 &#8211; WordPress Community Moves Toward Decentralization and Shared Control<\/h2>\n\n\n\n<p>A growing movement is pushing to build a parallel community to WordPress, aiming to increase stability and ensure its continued popularity. Disputes between Matt Mullenweg and WP Engine could shift control away from Automattic.<\/p>\n\n\n\n<p>The community is also exploring decentralizing plugin and theme distribution through multiple channels to reduce Automattic&#8217;s control.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.searchenginejournal.com\/wordpress-shakeup-signaled-by-3-recent-events\/538514\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#5 &#8211; Our blog: Keep Your Contact Form 7 Spam-Free<\/h2>\n\n\n\n<p>Spam in Contact Form 7 is a constant threat that simple CAPTCHAs and honeypots can\u2019t always stop. Modern spam tactics are more sophisticated, making single-layer defences ineffective.<\/p>\n\n\n\n<p>Advanced anti-spam strategies with layered defences, intelligent bot detection, and adaptive automation are crucial for keeping your forms secure.<\/p>\n\n\n\n<p><a href=\"https:\/\/getshieldsecurity.com\/blog\/contact-form-7-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<p>Thanks for reading, and have a wonderful week!<\/p>\n\n\n\n<p><strong>Paul Goodchild<\/strong><br><em>Shield Security for WordPress<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We bring the latest plugin security risks, including Elementor Pro and a recurring vulnerability in Ninja Forms. Hackers exploit outdated WordPress versions and plugins to spread malware. Plus, catch up on the new updates in the WordPress community and learn how to keep your Contact Form 7 spam-free, from our blog.<\/p>\n","protected":false},"author":27,"featured_media":163832,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[153,201],"tags":[69],"class_list":["post-167145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-wordpress-solutions","category-shieldnotes","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/167145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/comments?post=167145"}],"version-history":[{"count":4,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/167145\/revisions"}],"predecessor-version":[{"id":167149,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/167145\/revisions\/167149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media\/163832"}],"wp:attachment":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media?parent=167145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/categories?post=167145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/tags?post=167145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}