During testing of the Enhanced Text Widget plugin for WordPress, a security vulnerability was identified that allows for Stored Cross-Site Scripting (XSS) attacks. The vulnerability arises from the plugin’s failure to properly validate and escape certain widget options before outputting them back in attributes. As a result, high privilege users such as administrators or editors can exploit this flaw to execute malicious scripts, potentially leading to account takeover (if an attacker has previously hijacked an administrator or editor account, he can plant a backdoor to regain access back).
Plugin Security Certification: “Backuply” – Version 1.4.3: Protecting Your WordPress Assets with Secure Backups
In the ever-evolving landscape of WordPress, safeguarding your website against data loss is paramount. The “Backuply” plugin, now at version 1.4.3, offers a robust backup solution designed to protect your WordPress assets from server crashes, hacks, faulty updates, or plugin malfunctions. In this article, we explore the significance of this plugin, focusing on its security features and its recognition through the “Plugin Security Certification” (PSC) from CleanTalk.
CVE-2023-5711 – System Dashboard – Broken Logical Control to PHP info disclosure – POC
During the examination of the System Dashboard plugin for WordPress, a security vulnerability was identified that allows unauthorized access to sensitive data. This flaw stems from a lack of capability check on the sd_php_info() function, which is hooked via an AJAX action in all versions of the plugin up to, and including, 2.8.7. As a result, authenticated attackers with subscriber-level access and above can exploit this vulnerability to retrieve sensitive information provided by PHP info.
Plugin Security Certification: “Simple History” – Version 4.16.0: Enhancing WordPress Security with Action Logs
In the dynamic environment of WordPress, keeping track of changes made to your website is essential for maintaining security and accountability. The “Simple History” plugin, now at version 4.10.0, offers a comprehensive solution by providing a detailed log of recent activities directly on your dashboard or a separate page. In this article, we delve into the significance of this plugin, highlighting its security features and its recognition through the “Plugin Security Certification” (PSC) from CleanTalk.
CVE-2023-5942 – Medialist – Stored XSS via shortcode – POC
During the evaluation of the Medialist plugin, security researchers discovered a critical vulnerability enabling Stored Cross-Site Scripting (XSS) attacks. This vulnerability allows contributors to embed malicious JavaScript code into new posts using a specific shortcode, leading to potential account takeover and other malicious activities.
CVE-2023-4783 – Magee Shortcodes – Stored XSS via shortcode – POC
During the evaluation of the Magee Shortcodes plugin, security researchers identified a critical vulnerability enabling Stored Cross-Site Scripting (XSS) attacks. This vulnerability permits malicious actors to execute arbitrary JavaScript code within the context of a victim’s browser when interacting with a compromised post containing specially crafted shortcodes.
CVE-2024-1106 – Shariff Wrapper – Stored XSS to Admin Account Creation – POC
During testing of the Shariff Wrapper plugin, a critical vulnerability was identified that allows for the implementation of Stored Cross-Site Scripting (XSS) attacks. This vulnerability enables attackers to execute malicious scripts on behalf of contributors, potentially leading to account takeover and compromise of the WordPress admin account.
CVE-2023-7165 – JetBackup – Directory Listing to Account Takeover and Sensitive Data Exposure of Backup data – POC
During examination of the JetBackup plugin, a critical vulnerability was identified in the directory “/wordpress/wp-content/uploads/jetbackup/*”. This flaw exposes extensive information about the WordPress site, including its configuration, directories, and files. Moreover, it grants unauthorized access to sensitive data stored within the database and other files. Exploiting this vulnerability poses a significant threat, potentially leading to the compromise of the entire system.
CVE-2024-0970 – User Activity Tracking and Log – IP Spoofing
While scrutinizing the User Activity Tracking and Log plugin, a significant vulnerability was uncovered. This flaw allows an attacker to replace their actual IP address with any arbitrary IP address, specifically by adding a forged “X-Forwarded-For: 11.11.11.11” header to requests. This manipulation is evident in the activity log, such as during the creation of a new post.
CVE-2023-7202 – Fatal Error Notify – Error Email Sending CSRF
In the process of scrutinizing the Fatal Error Notify plugin for WordPress, a Cross-Site Request Forgery (CSRF) vulnerability was unearthed. This flaw permits an unauthorized user to manipulate requests on behalf of the victim, enabling the attacker to send erroneous error messages via email. The exploit can involve sending a large volume of HTML-coded messages to the victim’s email, potentially causing disruption and spamming issues. Furthermore, the repeated suspicious activity might lead to the blocking of the WordPress site’s email.