<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerability Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/vulnerability/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Tue, 10 Sep 2024 06:19:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>Vulnerability Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/vulnerability/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>WordPress Tracks Down XSS Vulnerability- Users To Update To 6.5.2</title>
		<link>https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2</link>
					<comments>https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/#respond</comments>
		
		<dc:creator><![CDATA[Blesson Jacob]]></dc:creator>
		<pubDate>Sat, 13 Apr 2024 18:53:24 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=120003</guid>

					<description><![CDATA[<p>WordPress users are advised to update to version 6.5.2, which includes security and maintenance fixes that address an XSS vulnerability. WordPress released its 6.5.2 maintenance and Security update on April 9th with the major concern of XSS vulnerability. The patch was released as an immediate update. WordPress asked its users to install the as quickly...</p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/">WordPress Tracks Down XSS Vulnerability- Users To Update To 6.5.2</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WordPress users are advised to update to version 6.5.2, which includes security and maintenance fixes that address an XSS vulnerability.</p>



<p><a href="https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/" target="_blank" rel="noreferrer noopener">WordPress released its 6.5.2 maintenance and Security update </a>on April 9th with the major concern of XSS vulnerability. The patch was released as an immediate update. WordPress asked its users to install the as quickly as possible.</p>



<p>WordPress announced the 6.5.2 Maintenance and Security Release update that patches a store cross-site scripting vulnerability and fixes over a dozen bugs in the core and the block editor. The same vulnerability affects both the WordPress core and the Gutenberg plugin.</p>



<h2 class="wp-block-heading" id="h-what-is-cross-site-scripting-xss">What Is Cross Site Scripting (XSS)</h2>



<p>An <a href="https://www.synopsys.com/glossary/what-is-cross-site-scripting.html#:~:text=Definition,the%20user%20to%20click%20it." target="_blank" rel="noreferrer noopener">XSS vulnerability </a>was discovered in WordPress that could allow an attacker to inject scripts into a website that then attacks site visitors to those pages. There are three kinds of XSS vulnerabilities but the most commonly discovered in WordPress plugins, themes, and WordPress itself are reflected XSS and stored XSS.</p>



<p>Cross-site scripting (XSS) attacks can be of two types &#8211; Reflected XSS and Stored XSS. Reflected XSS requires a user to click on a link, making launching the attack a bit difficult. On the other hand, Stored XSS is more dangerous as it exploits a vulnerability that allows the attacker to upload a script into the site that can be used to attack its visitors. In the case of WordPress, a Stored XSS vulnerability was discovered.</p>



<p>This vulnerability is a stored XSS that requires the attacker to have at least contributor-level permissions to exploit the website flaw that makes the vulnerability possible. Therefore, the threat is somewhat mitigated as it is authenticated. On the Common Vulnerability Scoring System (CVSS), this vulnerability is rated as medium-level and scored 6.4 out of 10.</p>



<h2 class="wp-block-heading" id="h-wordpress-recommends-an-immediate-update">WordPress Recommends An Immediate Update</h2>



<p>WordPress is recommending its users update to version 6.5.2 to avoid any malicious attack. The update has the required fixes and patches to the problem. </p>



<p><strong>Suggested Posts:</strong></p>



<p><a href="https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/" target="_blank" rel="noreferrer noopener">Vulnerability in the WordPress Plugin For The Metform Elementor Contact Form Builder</a>.</p>



<p><a href="https://www.trickyenough.com/reasons-why-you-should-password-protect-your-wordpress-site/" target="_blank" rel="noreferrer noopener">7 Reasons Why You Should Password Protect Your WordPress Site</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/">WordPress Tracks Down XSS Vulnerability- Users To Update To 6.5.2</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">120003</post-id>	</item>
		<item>
		<title>Vulnerability in the WordPress plugin for the Metform Elementor Contact Form Builder</title>
		<link>https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder</link>
					<comments>https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/#respond</comments>
		
		<dc:creator><![CDATA[Monisha]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 15:45:42 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=97759</guid>

					<description><![CDATA[<p>A vulnerability is affecting the Metform Elementor Contact Form Builder WordPress plugin. That potentially revealing private data was warned about by the US National Vulnerability Database (NVD). WordPress&#8217;s Metform Elementor Contact Form Builder is a third-party add-on. For the well-liked Elementor page builder plugin, which has more than 200,000 installations. With its drag-and-drop interface, it...</p>
<p>The post <a href="https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/">Vulnerability in the WordPress plugin for the Metform Elementor Contact Form Builder</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A vulnerability is affecting the Metform Elementor Contact Form Builder WordPress plugin. That potentially revealing private data was warned about by the US National Vulnerability Database (NVD).</p>



<p><a href="https://wordpress.org/plugins/metform/#developers" target="_blank" rel="noreferrer noopener">WordPress&#8217;s Metform Elementor</a> Contact Form Builder is a third-party add-on. For the well-liked Elementor page builder plugin, which has more than 200,000 installations. With its drag-and-drop interface, it is simple to create contact forms, even ones with multiple steps.</p>



<p>Beginners who lack coding abilities can construct surveys, contact forms, and referral feedback forms. And more with the help of the Metform contact form builder WordPress plugin for Elementor. Users can also save a form so they can access it again if they lose and regain Internet connection.</p>



<h2 class="wp-block-heading" id="h-vulnerability-to-information-disclosure">Vulnerability to Information Disclosure</h2>



<p>An attacker could use the vulnerability to get private data. Due to the requirement that an attacker secures a subscriber-level or higher user status, the NVD has classified this vulnerability as posing a medium-level threat.</p>



<p>As it is simpler to obtain than an admin or editor-level user role, a subscriber-level user role is a relatively low threshold for activating the exploit. An attack can start by an attacker with just one website subscription.</p>



<h2 class="wp-block-heading">The subscriber user role is described on the Elementor website as follows:</h2>



<p>A user of the website who is a WordPress subscriber can only change their profile, read posts, and leave comments.</p>



<p>WordPress employs the idea of &#8220;roles&#8221; to provide site owners control over and management over the range of actions (or &#8220;capabilities&#8221;) that users are permitted to perform on the website.</p>



<p>The user role with the fewest permissions at the lowest level is a subscriber.</p>



<h2 class="wp-block-heading">Update Plugin To Reduce Attack Risk</h2>



<p>This vulnerability affects up to and including version 3.3.1 of the Metform Elementor Contact Form Builder plugin. 3.4.0 is the most recent release of the plugin. The vulnerability was addressed in Metform Elementor Contact Form Builder 3.3.2.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/alert-performance-enhancements-take-off-thanks-to-wordpress/" target="_blank" rel="noreferrer noopener">Performance Enhancements Take Off Thanks to WordPress</a>.</p>



<p><a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/" target="_blank" rel="noreferrer noopener">Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/">Vulnerability in the WordPress plugin for the Metform Elementor Contact Form Builder</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">97759</post-id>	</item>
		<item>
		<title>Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</title>
		<link>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability</link>
					<comments>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Monisha]]></dc:creator>
		<pubDate>Mon, 04 Sep 2023 22:32:25 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=97221</guid>

					<description><![CDATA[<p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD). According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221; On a scale of one to 10, with...</p>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD).</p>



<p>According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221;</p>



<p>On a scale of one to 10, with 10 being the most serious vulnerability level, the vulnerability score rating is 9.8, with 1 being the least vulnerable.</p>



<h2 class="wp-block-heading" id="h-potential-for-unauthorised-attacks">Potential For Unauthorised Attacks</h2>



<p>In order to exploit many vulnerabilities, an attacker typically has to be a WordPress user or higher. For instance, although specific vulnerabilities are accessible to users with the subscriber user level. Others require the contributor or admin level to be exploited.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://www.searchenginejournal.com/wp-content/uploads/2023/08/screenshot-wordfence-forminator-vulnerability-64eeed599cefb-sej.png" alt=""></figure></div>


<p>This vulnerability is especially concerning because it enables unauthenticated attackers. Those with no user level at all to successfully hijack the website.</p>



<p>The attacker can upload an arbitrary file, which refers to any kind of file, such as a malicious script. This is another reason why this vulnerability is rated 9.8 on a scale of 1 to 10 (critical).</p>



<h2 class="wp-block-heading">Execution of Remote Code</h2>



<p>An exploit that allows the attacker to remotely execute malicious code on the targeted website. From another computer is known as a remote code execution (RCE) vulnerability. An entire site takeover could cause more harm than this kind of hack.</p>



<h2 class="wp-block-heading">Contact Forms Must Be Strictly Controlled</h2>



<p><a href="https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/" target="_blank" rel="noreferrer noopener">WordPress plugins that permit logged-in or anonymous users</a> to upload anything. Including text or photos, must have a method to restrict what can be uploaded. Because they allow public feedback, contact forms need to be particularly secure.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/wordpress-now-offers-a-content-generator-powered-by-openai-with-free-access/" target="_blank" rel="noreferrer noopener">WordPress Now Offers A Content Generator Powered By OpenAI, With Free Access</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-has-made-a-free-course-on-creating-and-monetizing-membership-websites-available/" target="_blank" rel="noreferrer noopener">WordPress has made a Free Course on Creating and Monetizing Membership Websites Available</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-in-discussion-towards-ai-integration/" target="_blank" rel="noreferrer noopener">WordPress in Discussion Towards AI Integration</a>.</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">97221</post-id>	</item>
	</channel>
</rss>
