CVE-2024-10939 – Image Widget – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10939 – Image Widget – Stored XSS to JS Backdoor Creation – POC

The Image Widget plugin for WordPress, used to add image widgets to pages or posts, has been found to have a critical Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2024-10939. This vulnerability allows attackers with editor-level privileges to inject malicious JavaScript into the “imgurl” field of an image widget. The injected script is stored and executed when the widget is rendered, potentially leading to account takeover and the creation of a backdoor. With over 100,000 active installations, this vulnerability poses a significant security risk for WordPress sites using the Image Widget plugin.

CVE-2024-10568 – Ajax Search Lite – Live Search & Filter – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10568 – Ajax Search Lite – Live Search & Filter – Stored XSS to JS Backdoor Creation – POC

Ajax Search Lite, a popular WordPress plugin that enables live search and filtering functionality, has been found to have a critical Stored Cross-Site Scripting (XSS) vulnerability, CVE-2024-10568. This vulnerability allows attackers with editor-level access to inject malicious JavaScript into the plugin’s settings, which is stored in the WordPress database and executed when the settings are accessed. The injected JavaScript can create a backdoor, potentially leading to account takeover and site compromise. With over 100,000 active installations, this vulnerability poses a significant security risk for WordPress sites that use the Ajax Search Lite plugin.

Plugin Security Certification (PSC-2024-64532): “External Links – nofollow, noopener & new window” – Version 2.62: Use External Links with Enhanced Security

Plugin Security Certification (PSC-2024-64532): “External Links – nofollow, noopener & new window” – Version 2.62: Use External Links with Enhanced Security

External Links – nofollow, noopener & new window is a powerful plugin designed to give WordPress users complete control over managing external and internal links. It allows website administrators to configure attributes such as nofollow, noopener, ugc, and sponsored for SEO and security optimization. Additionally, the plugin can open links in new windows or tabs, helping to enhance user experience and maintain site integrity.

The plugin introduces advanced features like link icons and attributes, link scanning (PRO version), and customizable link rules. Moreover, it works seamlessly with WordPress Multisite (WPMU) environments and is GDPR-compliant, ensuring safe and efficient link management for all users. External Links – nofollow, noopener & new window has earned the Plugin Security Certification (PSC) from CleanTalk, signifying its adherence to rigorous security standards.

Effective prevention methods for CSRF

Effective prevention methods for CSRF

CSRF (Cross-Site Request Forgery) is a type of web application vulnerability in which an attacker tricks a user into performing an unwanted action on a site where the user is already authenticated.For WordPress sites, this vulnerability can be exploited by unauthorized changes to site settings, content publishing, or even administrative actions.

CSRF vulnerabilities in WordPress can occur when developers misuse protection mechanisms or ignore them altogether. Despite built-in tools to prevent CSRF, implementation errors can make the application vulnerable. Let’s take a closer look at the main scenarios, vulnerabilities, and their exploitation.

CVE-2024-10010 – LearnPress – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10010 – LearnPress – Stored XSS to JS Backdoor Creation – POC

LearnPress, a popular WordPress plugin for creating and managing online courses, has been found to contain a critical Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2024-10010. This vulnerability allows attackers with editor-level access to inject malicious JavaScript into the plugin’s settings, which is then stored and executed when the settings are viewed. The injected script can create a backdoor, allowing the attacker to take control of the site and escalate privileges, leading to a full account takeover. With over 100,000 active installations, this vulnerability poses a significant security risk to WordPress sites that rely on LearnPress for managing educational content.

CVE-2024-9428 – Popup Builder – Stored XSS to JS Backdoor Creation – POC

CVE-2024-9428 – Popup Builder – Stored XSS to JS Backdoor Creation – POC

Popup Builder, a popular WordPress plugin used to create and manage popups on websites, has been found to contain a critical Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2024-9428. This flaw allows attackers to inject malicious JavaScript into the plugin’s settings, specifically within the “Alt Text” field of an image in the popup. The injected script can be executed when the popup is viewed, enabling attackers to escalate privileges and potentially create a backdoor for account takeover. This vulnerability affects over 200,000 installations of the Popup Builder plugin and presents a serious security risk for WordPress sites using this plugin.

CVE-2024-10517 – ProfilePress – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10517 – ProfilePress – Stored XSS to JS Backdoor Creation – POC

ProfilePress is a popular WordPress plugin used for creating and managing user login, registration, and profile forms. It provides features to enhance user experience and website functionality. However, a critical vulnerability, CVE-2024-10517, has been discovered in the plugin. This flaw allows attackers with editor-level access to inject malicious JavaScript into the “User Login” field of a new form, which is then stored and executed on the site. The vulnerability can lead to account takeover and the creation of a backdoor for the attacker, compromising the integrity of the WordPress installation. With over 200,000 active installations, this vulnerability represents a significant security risk for websites using ProfilePress.

CVE-2024-10518 – ProfilePress – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10518 – ProfilePress – Stored XSS to JS Backdoor Creation – POC

ProfilePress, a popular WordPress plugin used for user registration, login forms, and membership management, has been found to contain a critical Stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2024-10518. This flaw allows an attacker to inject malicious JavaScript into the plugin’s settings, particularly in the “Name” field of the Membership Plan configuration. When executed, the injected JavaScript can create a backdoor, allowing the attacker to take control of the WordPress site. With over 200,000 active installations, this vulnerability poses a significant security threat to a large number of WordPress sites.

Plugin Security Certification (PSC-2024-64531): “Health Check & Troubleshooting” – Version 1.7.1: Use Health Checks with Enhanced Security

Plugin Security Certification (PSC-2024-64531): “Health Check & Troubleshooting” – Version 1.7.1: Use Health Checks with Enhanced Security

Managing a secure and efficient WordPress site is a top priority for any website owner. The Health Check & Troubleshooting plugin has been specifically designed to ensure your WordPress installation remains in optimal condition. Whether you’re debugging a theme conflict or performing routine checks, this plugin offers a robust suite of tools to maintain site stability and security. With its recent Plugin Security Certification (PSC-2024-64531) from CleanTalk, you can now use the plugin with the confidence that it meets stringent security standards.