{"id":170716,"date":"2026-01-26T14:01:27","date_gmt":"2026-01-26T14:01:27","guid":{"rendered":"https:\/\/getshieldsecurity.com\/?p=170716"},"modified":"2026-01-26T14:03:25","modified_gmt":"2026-01-26T14:03:25","slug":"shieldnotes-92","status":"publish","type":"post","link":"https:\/\/getshieldsecurity.com\/blog\/shieldnotes-92\/","title":{"rendered":"ACF &amp; Other Critical Flaws; &amp; Keep WordPress Secure"},"content":{"rendered":"\n<p>New vulnerabilities this week range from recurring issues in popular plugins to a serious high\u2011risk threat in ACF.<\/p>\n\n\n\n<p>We also include a security checklist from our blog to help keep your WordPress site safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#1 &#8211; High Security Risks in Popular Plugins<\/h2>\n\n\n\n<p>A critical vulnerability in this plugin could allow unauthorised high-level privilege access, potentially enabling full site compromise across 100,000+ installations.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/acf-extended\/vulnerability\/wordpress-advanced-custom-fields-extended-plugin-0-9-2-1-unauthenticated-privilege-escalation-via-insert-user-form-action-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Custom Fields: Extended Plugin<\/a><br><\/strong>Privilege Escalation; <strong>9.8<\/strong>\/10; Update to v0.9.2.2+<strong><br><br>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#2 &#8211; Lower Security Risks in Popular Plugins<\/h2>\n\n\n\n<p>Small glitches aside, these widely used plugins remain critical to track, as they affect millions of sites.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/happy-elementor-addons\/vulnerability\/wordpress-happy-addons-for-elementor-plugin-3-20-4-sql-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Happy Addons for Elementor Plugin<\/a><br><\/strong>SQL Injection; 8.5\/10; Update to v3.20.6+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/beaver-builder-lite-version\/vulnerability\/wordpress-beaver-builder-plugin-2-9-4-1-arbitrary-code-execution-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Beaver Builder Plugin<\/a><br><\/strong>Arbitrary Code Execution; 7.5\/10; Update to v2.9.4.2+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/buddypress\/vulnerability\/wordpress-buddypress-plugin-14-3-3-unauthenticated-arbitrary-shortcode-execution-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">BuddyPress Plugin<\/a><br><\/strong>Arbitrary Code Execution; 7.3\/10; Update to v14.3.4+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/custom-fonts\/vulnerability\/wordpress-custom-fonts-host-your-fonts-locally-plugin-2-1-16-missing-authorization-to-unauthenticated-font-deletion-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Custom Fonts \u2013 Host Your Fonts Locally Plugin<\/a><br><\/strong>Broken Access Control; 6.5\/10; Update to v2.1.17+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/schema-and-structured-data-for-wp\/vulnerability\/wordpress-schema-structured-data-for-wp-amp-plugin-1-54-authenticated-contributor-stored-cross-site-scripting-via-user-custom-schema-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Schema &amp; Structured Data for WP &amp; AMP Plugin<\/a><br><\/strong>XSS; 6.5\/10; Update to v1.54.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/the-events-calendar\/vulnerability\/wordpress-the-events-calendar-plugin-6-15-13-missing-authorization-to-authenticated-subscriber-data-migration-control-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">The Events Calendar Plugin<\/a><br><\/strong>Broken Access Control; 5.4\/10; Update to v6.15.13.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/photo-gallery\/vulnerability\/wordpress-photo-gallery-by-10web-plugin-1-8-36-missing-authorization-to-unauthenticated-arbitrary-comment-deletion-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Photo Gallery by 10Web Plugin<\/a><br><\/strong>Broken Access Control; 5.3\/10; Update to v1.8.37+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/newsletter\/vulnerability\/wordpress-newsletter-send-awesome-emails-from-wordpress-plugin-9-1-0-cross-site-request-forgery-to-newsletter-unsubscription-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Newsletter Plugin<\/a><br><\/strong>CSRF; 4.3\/10; Update to v9.1.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/metform\/vulnerability\/wordpress-metform-contact-form-survey-quiz-custom-form-builder-for-elementor-plugin-4-1-0-unauthenticated-form-submission-exposure-via-forgeable-cookie-value-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Metform Plugin<\/a><br><\/strong>Broken Authentication; 3.7\/10; Update to v4.1.1+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#3 &#8211; High Security Risks in Less Popular Plugins<\/h2>\n\n\n\n<p>These plugins may be less common but are high risk wherever they are used.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/realhomes-crm\/vulnerability\/wordpress-real-homes-crm-plugin-1-0-0-arbitrary-file-upload-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Real Homes CRM Plugin<\/a><br><\/strong>Arbitrary File Upload; <strong>9.9<\/strong>\/10; Update to v1.0.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/lastudio-element-kit\/vulnerability\/wordpress-la-studio-element-kit-for-elementor-plugin-1-5-6-3-unauthenticated-privilege-escalation-via-backdoor-to-administrative-user-creation-via-lakit-bkrole-parameter-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">LA-Studio Element Kit for Elementor Plugin<\/a><br><\/strong>Backdoor; <strong>9.8<\/strong>\/10; Update to v1.6.0+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/nexter-extension\/vulnerability\/wordpress-nexter-extension-site-enhancements-toolkit-plugin-4-4-6-unauthenticated-php-object-injection-via-nxt-unserialize-replace-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Nexter Extension Plugin<\/a><br><\/strong>PHP Object Injection; <strong>9.8<\/strong>\/10; Update to v4.4.7+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/academy\/vulnerability\/wordpress-academy-lms-wordpress-lms-plugin-for-complete-elearning-solution-plugin-3-5-0-unauthenticated-privilege-escalation-via-account-takeover-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Academy LMS Plugin<\/a><br><\/strong>Privilege Escalation; <strong>9.8<\/strong>\/10; Update to v3.5.1+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/woo-mailerlite\/vulnerability\/wordpress-mailerlite-woocommerce-integration-plugin-3-1-2-sql-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">MailerLite \u2013 WooCommerce integration Plugin<\/a><br><\/strong>SQL Injection; <strong>9.3<\/strong>\/10; Update to v3.1.3+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/xpro-elementor-addons\/vulnerability\/wordpress-xpro-elementor-addons-plugin-1-4-19-1-arbitrary-file-upload-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Xpro Elementor Addons Plugin<\/a><br><\/strong>Arbitrary File Upload; <strong>9.1<\/strong>\/10; Update to v1.4.20+<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/patchstack.com\/database\/wordpress\/plugin\/nelio-ab-testing\/vulnerability\/wordpress-nelio-ab-testing-plugin-8-1-8-arbitrary-code-execution-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Nelio AB Testing Plugin<\/a><br><\/strong>Arbitrary Code Execution; <strong>9.1<\/strong>\/10; Update to v8.2.0+<\/p>\n\n\n\n<p><strong>Editor Comment<\/strong><br>It&#8217;s worth taking a few minutes each week to <a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">perform a sites review<\/a> to catch issues early and wherever possible, use <a href=\"https:\/\/shsec.io\/lw\" target=\"_blank\" rel=\"noreferrer noopener\">ShieldPRO&#8217;s auto-upgrade<\/a> feature for vulnerable plugins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">#4 &#8211; Our blog: WordPress Security Checklist<\/h2>\n\n\n\n<p>Keeping your website secure can seem daunting at first. To make it easy for you we have put together a comprehensive checklist that you should look for when securing your WordPress website.<\/p>\n\n\n\n<p><a href=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-checklist\/\" data-type=\"link\" data-id=\"https:\/\/getshieldsecurity.com\/blog\/wordpress-security-checklist\/\" target=\"_blank\" rel=\"noreferrer noopener\">More Info \u2192<\/a><\/p>\n\n\n\n<p>Thanks for reading, and have a wonderful week!<\/p>\n\n\n\n<p><strong>Paul Goodchild<\/strong><br><em>Shield Security for WordPres<\/em>s<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New vulnerabilities this week range from recurring issues in popular plugins to a serious high\u2011risk threat in ACF. We also include a security checklist from our blog to help keep your WordPress site safe.<\/p>\n","protected":false},"author":27,"featured_media":163832,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[153,201],"tags":[69],"class_list":["post-170716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-wordpress-solutions","category-shieldnotes","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/170716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/comments?post=170716"}],"version-history":[{"count":3,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/170716\/revisions"}],"predecessor-version":[{"id":170719,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/posts\/170716\/revisions\/170719"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media\/163832"}],"wp:attachment":[{"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/media?parent=170716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/categories?post=170716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/getshieldsecurity.com\/wp-json\/wp\/v2\/tags?post=170716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}