This article was originally published on this site

WordPress vulnerability news is a weekly digest of highlighted WordPress plugin security vulnerabilities or vulnerability discloses that have been published (there are other, less critical vulnerabilities on smaller plugins that unfortunately don’t make it to the list). 

Keeping up to date with security vulnerabilities in WordPress and other CMS’s is an important part of security. That is why we are analyzing WordPress plugins and newly disclosed vulnerabilities to make sure the sites using the mentioned plugins or themes are protected.

All the vulnerabilities you find from this article have received a virtual patch to the WebARX firewall. It means that if you use the WebARX web application firewall, your site is safe from these vulnerabilities, but it’s always strongly advised to update or delete vulnerable plugins from your site.

Is your WordPress site secured? Take a look at how to secure your site here.

If you are a WordPress plugin developer read how to secure plugins from an attackers’ perspective.

Authenticated Reflected XSS in CSS Hero Plugin

Screenshot from www.csshero.org

CSS Hero is the definitive WordPress plugin to easily customize the look of your site, with an easy and intuitive point and click interface.

Vulnerability: Authenticated Reflected XSS
Vulnerable version: 4.03 and below
Number of sites affected: N/A

CSS Hero is vulnerable to a reflected XSS attack (authenticated).

Read more about the WordPress plugin vulnerabilities here.

WordPress 5.3 – Cross-Site Scripting

5.3 expands and refines the block editor with more intuitive interactions and improved accessibility. New features in the editor increase design freedoms, provide additional layout options and style variations to allow designers more control over the look of a site.

Vulnerability: Cross-site scripting (XSS)
Vulnerable version: 5.3 and earlier
The number of sites affected: N/A

This security and maintenance release features 46 fixes and enhancements. Plus, it adds a number of security fixes.

Four security issues affect WordPress versions 5.3 and earlier; version 5.3.1 fixes them, so you’ll want to upgrade. If you haven’t yet updated to 5.3, there are also updated versions of 5.2 and earlier that fix the security issues.

  • Props to Daniel Bachhuber for finding an issue where an unprivileged user could make a post sticky via the REST API.
  • Props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where cross-site scripting (XSS) could be stored in well-crafted links.
  • Props to the WordPress.org Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.
  • Props to Nguyen The Duc for discovering a stored XSS vulnerability using block editor content.

Read more here.

Stored Cross-Site Scripting (XSS) in Scoutnet Kalender Plugin

“Scoutnet Kalender” is a plug-in for WordPress to display one oder manyScoutnet calendars as a widget, on a page or an article.

Vulnerability type: Cross-Site Scripting (XSS)
Vulnerable version: 1.1.0
Number of sites affected: 300+

The plugin does not sanitize the ‘Info’ field from embedded calendars (which are retrieved from Scoutnet and are not necessarily owned/managed by the administrator of the blog).

Read more about the WordPress plugin vulnerabilities here.

Authentication Bypass in Ultimate Addons for Elementor Plugin

plugin vulnerabilities

A library of unique Elementor Widgets to add more functionality and flexibility to your favorite page builder.

Vulnerability type: Authentication bypass
Vulnerable version: 1.20.0 and below
Number of sites affected: N/A

The vulnerability is fixed in version 1.24.1.

Read more about the WordPress plugin vulnerabilities here.

Authentication Bypass in Ultimate Addons for Beaver Builder Plugin 1.24.0

plugin vulnerabilities

Transform your productivity with custom Beaver Builder modules and templates.

Vulnerability type: Authentication bypass
Vulnerable version: 1.24.0 and below
Number of sites affected: N/A

The vulnerability is fixed in version 1.24.1.

Read more about the WordPress plugin vulnerabilities here.

Authenticated Reflected XSS in Quiz And Survey Master Plugin

plugin vulnerabilities

You can easily create surveys for your users. Everything from customer satisfaction surveys to employee surveys.

Vulnerability type: Authenticated Reflected XSS
Vulnerable version: 6.3.5 and below
Number of sites affected: 20 000+

Read more about the WordPress plugin vulnerabilities here.

Get 20% off from any WebARX plan with the code:
20offxmas

GET 20% OFF

Other Related News

Why Protect Websites Before Winter Holidays?

plugin vulnerabilities

There is a worst possible time to suffer an attack or data breach and it’s Christmas.

A survey made among the participants of the Defcon conference states that about 81% of the hackers said that most often their hacks happen during the winter holidays.

In addition to hackers being more active, shoppers are as well.

Several surveys made with people in the U.K., France, Germany, Spain, Australia, India, and Singapore stated that they had fallen victim to fake charity scams in 2019. 

The study also showed that 64% of organizations saw the attacks getting more and more frequent when Christmas time arrived. The spikes were up to 64%. 

Article containing statistics, infographic and 6 tips on how to stay safe during holidays.

Read the article from here.

Cybercriminals targeting e-commerce website vulnerabilities this holiday season

“Online merchants and website owners must recognize the critical need for client-side security. The fundamental driver of online commerce — consumer trust — is at stake as attackers target widespread client-side vulnerabilities to steal credentials, credit card numbers, financial data, and other PII.” – Aanand Krishnan, Tala Security

Key findings from the survey

  • Only 2% of Alexa 1000 sites have implemented effective controls to prevent personal, financial and credential theft.
  • User form data sent, captured on forms available on 98% of websites, is exposed to 10 times more domains than intended by the website owner. This creates a massive opportunity for data theft from attackers.
  • The average website relies on 31 third-party integrations, which provide nearly two-thirds of the content customers view on their browsers. This content is delivered via client-side connections that lack effective security controls.
  • Most consumers will be surprised to learn that only one-third of the content rendering on their browser is owned, created and served by the owner of the website. The remaining two-thirds is served via client-side connections that lack effective security.
  • Although 27% of website owners attempt to deploy security measures, only 2% succeed in deploying effective policies capable of preventing client-side attacks.

Read more from helpnetsecurity.com

Conclusion

WordPress sites are being hacked and infected every day. Some statistics say that about 30,000 websites are infected with some type of malware daily. Every public website is a resource available on the internet and therefore it’s a target. It’s important to understand that as soon as your website is available to the public, it immediately becomes a target. 

It can take just days from a disclosed plugin vulnerability to a full-scale attack campaign. Attacks in this nature are almost always automated. To be able to fight back, you have a small time window to take action. In such cases, web application firewalls have critical importance.

Always keep your plugins updated. If possible, enable automatic updates. If you are using any of the mentioned plugins, you need to update it with the latest version as soon as possible to make sure WordPress plugin security vulnerabilities won’t affect your sites.

WebARX web application firewall gets virtual patches that are distributed automatically among the sites when vulnerabilities are discovered. Threat intelligence and prevention are our main focus and thus our firewall engine is updated on a daily basis.

Websites with WebARX firewall installed are protected from the security issues mentioned in this article. If you are not protecting your WordPress site against plugin vulnerabilities yet go and start for free here.

Get 20% off from any WebARX plan with the code:
20offxmas

GET 20% OFF

WordPress security