<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Plugin Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/plugin/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/plugin/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Tue, 10 Sep 2024 06:19:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Plugin Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/plugin/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>WordPress AMP Plugin Hits Over 100,000 Sites</title>
		<link>https://www.trickyenough.com/news/wordpress-amp-plugin-hits-over-100000-sites/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-amp-plugin-hits-over-100000-sites</link>
					<comments>https://www.trickyenough.com/news/wordpress-amp-plugin-hits-over-100000-sites/#respond</comments>
		
		<dc:creator><![CDATA[Namita Mahajan]]></dc:creator>
		<pubDate>Wed, 29 Nov 2023 20:31:19 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=107198</guid>

					<description><![CDATA[<p>WordPress AMP Plugin, boasting over 100,000 installs, just dealt with a medium-level vulnerability. This little loophole had the potential for trouble, allowing sneaky attackers to slide in malicious scripts, turning your website into an unintended party zone for unwelcome guests. But fear not! The AMP plugin has tightened things up to keep your virtual doors...</p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-amp-plugin-hits-over-100000-sites/">WordPress AMP Plugin Hits Over 100,000 Sites</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WordPress AMP Plugin, boasting <a href="https://wordpress.org/plugins/amp/" target="_blank" rel="noreferrer noopener">over 100,000 installs</a>, just dealt with a medium-level vulnerability. This little loophole had the potential for trouble, allowing sneaky attackers to slide in malicious scripts, turning your website into an unintended party zone for unwelcome guests.</p>



<p>But fear not! The AMP plugin has tightened things up to keep your virtual doors secure. It&#8217;s always a good call to stay on top of updates and ensure your website is running the latest version for a smooth and safe online experience.&nbsp;</p>



<h2 class="wp-block-heading" id="h-wordpress-amp-plugin-shortcode-opening-the-door-to-cross-site-scripting">WordPress AMP Plugin Shortcode Opening the Door to Cross-Site Scripting</h2>



<p>Cross-site scripting (XSS) is a common vulnerability, especially in <a href="https://www.trickyenough.com/essential-wordpress-plugins/" target="_blank" rel="noreferrer noopener">WordPress plugins</a>. Here&#8217;s the lowdown: XSS happens when a plugin like WordPress AMP Plugin lets data sneak in without proper security checks.</p>



<p>Think of sanitization as the bouncer at the club it blocks the unwanted guests. For instance, if a plugin lets users drop text in an input field, it should scrub anything odd, like a script or a sneaky zip file.</p>



<p>Now, shortcodes are like magic tags in WordPress. Users can slap on a [example] tag in posts, and boom!  a plugin&#8217;s functionality shows up. It&#8217;s like configuring a plugin backstage and then dropping the shortcode on stage for everyone to see in a post or page.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="705" height="357" src="https://www.trickyenough.com/wp-content/uploads/2023/11/VideoSeries-2-Asset-5@4x-1024x519-1-705x357-1.png" alt="WordPress AMP Plugin" class="wp-image-107200" srcset="https://www.trickyenough.com/wp-content/uploads/2023/11/VideoSeries-2-Asset-5@4x-1024x519-1-705x357-1.png 705w, https://www.trickyenough.com/wp-content/uploads/2023/11/VideoSeries-2-Asset-5@4x-1024x519-1-705x357-1-300x152.png 300w, https://www.trickyenough.com/wp-content/uploads/2023/11/VideoSeries-2-Asset-5@4x-1024x519-1-705x357-1-150x76.png 150w" sizes="(max-width: 705px) 100vw, 705px" /></figure></div>


<h2 class="wp-block-heading" id="h-plugin-s-different-versions">Plugin&#8217;s Different Versions</h2>



<p>A security glitch called &#8220;cross-site scripting via shortcode&#8221; lets troublemakers inject nasty scripts into a website. According to Patchstack, a WordPress security whiz, this could mean anything from redirects to ads, triggering when innocent visitors drop by.</p>



<p>The good news is that the glitch was fixed in version 1.0.89. Wordfence, another watchdog, explains that WordPress&#8217;s Accelerated Mobile Pages plugin was the culprit, playing loose with input checks in versions up to 1.0.88.1.</p>



<p>Here&#8217;s the kicker: the bad actor needs at least contributor-level permissions to pull off this stunt. Patchstack rates it a 6.5 out of 10 on the severity scale. Better safe than sorry, ensure your WordPress AMP Plugin is rocking version 1.0.89 or higher.</p>



<p><strong>Recommended:</strong></p>



<p><a href="https://www.trickyenough.com/the-future-of-wordpress-predictions-and-trends-for-the-next-decade/" target="_blank" rel="noreferrer noopener">The Future of WordPress: Predictions and Trends for the Next Decade</a>.</p>



<p><a href="https://www.trickyenough.com/types-of-wordpress-plugins-you-need-for-your-business/" target="_blank" rel="noreferrer noopener">9 Types of WordPress Plugins You Need For Your Business</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-amp-plugin-hits-over-100000-sites/">WordPress AMP Plugin Hits Over 100,000 Sites</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/wordpress-amp-plugin-hits-over-100000-sites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">107198</post-id>	</item>
		<item>
		<title>Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</title>
		<link>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability</link>
					<comments>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Monisha]]></dc:creator>
		<pubDate>Mon, 04 Sep 2023 22:32:25 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=97221</guid>

					<description><![CDATA[<p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD). According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221; On a scale of one to 10, with...</p>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD).</p>



<p>According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221;</p>



<p>On a scale of one to 10, with 10 being the most serious vulnerability level, the vulnerability score rating is 9.8, with 1 being the least vulnerable.</p>



<h2 class="wp-block-heading" id="h-potential-for-unauthorised-attacks">Potential For Unauthorised Attacks</h2>



<p>In order to exploit many vulnerabilities, an attacker typically has to be a WordPress user or higher. For instance, although specific vulnerabilities are accessible to users with the subscriber user level. Others require the contributor or admin level to be exploited.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://www.searchenginejournal.com/wp-content/uploads/2023/08/screenshot-wordfence-forminator-vulnerability-64eeed599cefb-sej.png" alt=""></figure></div>


<p>This vulnerability is especially concerning because it enables unauthenticated attackers. Those with no user level at all to successfully hijack the website.</p>



<p>The attacker can upload an arbitrary file, which refers to any kind of file, such as a malicious script. This is another reason why this vulnerability is rated 9.8 on a scale of 1 to 10 (critical).</p>



<h2 class="wp-block-heading">Execution of Remote Code</h2>



<p>An exploit that allows the attacker to remotely execute malicious code on the targeted website. From another computer is known as a remote code execution (RCE) vulnerability. An entire site takeover could cause more harm than this kind of hack.</p>



<h2 class="wp-block-heading">Contact Forms Must Be Strictly Controlled</h2>



<p><a href="https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/" target="_blank" rel="noreferrer noopener">WordPress plugins that permit logged-in or anonymous users</a> to upload anything. Including text or photos, must have a method to restrict what can be uploaded. Because they allow public feedback, contact forms need to be particularly secure.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/wordpress-now-offers-a-content-generator-powered-by-openai-with-free-access/" target="_blank" rel="noreferrer noopener">WordPress Now Offers A Content Generator Powered By OpenAI, With Free Access</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-has-made-a-free-course-on-creating-and-monetizing-membership-websites-available/" target="_blank" rel="noreferrer noopener">WordPress has made a Free Course on Creating and Monetizing Membership Websites Available</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-in-discussion-towards-ai-integration/" target="_blank" rel="noreferrer noopener">WordPress in Discussion Towards AI Integration</a>.</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">97221</post-id>	</item>
	</channel>
</rss>
