During testing of the Shariff Wrapper plugin, a critical vulnerability was identified that allows for the implementation of Stored Cross-Site Scripting (XSS) attacks. This vulnerability enables attackers to execute malicious scripts on behalf of contributors, potentially leading to account takeover and compromise of the WordPress admin account.
During examination of the JetBackup plugin, a critical vulnerability was identified in the directory “/wordpress/wp-content/uploads/jetbackup/*”. This flaw exposes extensive information about the WordPress site, including its configuration, directories, and files. Moreover, it grants unauthorized access to sensitive data stored within the database and other files. Exploiting this vulnerability poses a significant threat, potentially leading to the compromise of the entire system.
While scrutinizing the User Activity Tracking and Log plugin, a significant vulnerability was uncovered. This flaw allows an attacker to replace their actual IP address with any arbitrary IP address, specifically by adding a forged “X-Forwarded-For: 184.108.40.206” header to requests. This manipulation is evident in the activity log, such as during the creation of a new post.
In the process of scrutinizing the Fatal Error Notify plugin for WordPress, a Cross-Site Request Forgery (CSRF) vulnerability was unearthed. This flaw permits an unauthorized user to manipulate requests on behalf of the victim, enabling the attacker to send erroneous error messages via email. The exploit can involve sending a large volume of HTML-coded messages to the victim’s email, potentially causing disruption and spamming issues. Furthermore, the repeated suspicious activity might lead to the blocking of the WordPress site’s email.
During testing of the plugin, a vulnerability was discovered that allows the user, starting from the “Subscriber” (lower privs) privileges, to access AJAX requests that can output the following data: password and login from the database -which is very critical, password and login from the mailbox, phpinfo() and all the information that the plugin can output about the web application
A critical security vulnerability has been identified in the Debug Log Manager plugin, marked by a missing authorization check during the handling of the action=clear_log method. This lapse in validation opens the door to Cross-Site Request Forgery (CSRF) attacks, providing unauthorized actors with the ability to clear PHP logs in the affected plugin.
A critical vulnerability has been unearthed within the FastDup – Fastest WordPress Migration & Duplicator plugin, residing in the directory wordpress/wp-content/njt-fastdup/packages. This vulnerability exposes a plethora of information about the WordPress site, encompassing its configuration details, directories, and files. More alarmingly, it allows unauthorized access to sensitive data housed within the database, including user passwords. The severity of this flaw is exemplified by the imminent threat it poses, creating a gateway for potential brute force attacks on password hashes and, consequently, the entire compromise of the system.
In the process of testing the plugin, a CSRF vulnerability was found in action=rpws_user_update_password, which allows you to change the password to any user and in some saluchayah to seize the administrator account
In a recent examination of the WP-STAGING plugin, a highly critical vulnerability was uncovered, posing an existential threat to the security of WordPress installations. This flaw resides in the directory /wordpress/wp-content/uploads/wp-staging/ and exposes not only intricate details about the site’s
During a comprehensive assessment of the WP User Profile Avatar plugin, a significant vulnerability was identified, namely Insecure Direct Object Reference (IDOR). This flaw allows unauthorized users to delete or alter someone else’s avatar without the necessary privileges.