managed securityUnrestricted Access Issues

Unrestricted Access MAY 2021

Managed WordPress Security Report

Be informed about the latest Unrestricted Access MAY 2021 - WP Security Circumvention, identified and reported publicly. These breaches create even more problems and vulnerability exploitation with a severe negative impact on any WordPress Security. Consider our FREE security AUDIT.

An estimated 4.499.000+ active WordPress installations are susceptible to these attack types, considering only the publicly available numbers. The estimated number can double with premium versions as they are private purchases.

Furthermore, the initial estimation can multiply if we consider the already patched versions BUT NOT UPDATED by owners, as the vulnerability remains active within their domain. As these owners start changing their hosting provider (due to constant unexplained issues), they actively migrate these vulnerabilities behind protected areas, possibly exposing other clean WP to different attack types.

It is a 400% increase compared to December 2020. We compare last month versus previous winter holiday season, which has the biggest shopping traffic and attack spike throughout the year. Read more about our previous report here: 35 Unrestricted Access APR 2021 – WP Security Circumvention and 5 Unrestricted Access Issues – WordPress Security DEC. The following cases made headlines PUBLICLY just last month in the Unrestricted Access MAY 2021 – WP Security Circumvention category:




  • CM Registration Pro < 3.2.1 - PHP Object Injection
    • Add a user registration and login pop-up box to any page with this WordPress login plugin. This superb user registration plugin gives you user invitation codes, social login, email verification, custom registration forms, forgot password option, custom fields, front-end user profile builders and more. Active installations: Not public info




managed WordPress SECURITY

Protect your WordPress: BEFORE IT’S TOO LATE! You will also protect your customers, your reputation and your online business!




  • ReDi Restaurant Reservation < 21.0426 - Unauthenticated Stored Cross-Site Scripting (XSS)
    • The one and only fully automated reservation system. Real time available seats check with instant reservation confirmation for your guests. Don’t spent anymore time for manually reviewing and confirming reservations. Turn your web site visitors into restaurant’s guests. Don’t let your guest wait, surprise him with instant confirmation. Active installations: 1,000+







  • SP Project & Document Manager <= 4.21 - Authenticated Shell Upload
    • Project & Document management plugin, Remote file sharing, maintain and control unlimited number of documents, records, files, media, videos and images. You can create unlimited folders and sub folders to share, organize, manage client, student & supplier documents and accounts, control individual documents, and select specific file sharing of documents all in an easy to manage online process. Active installations: 3,000+




  • WP Super Cache < 1.7.3 - Authenticated Remote Code Execution
    • This plugin generates static html files from your dynamic WordPress blog. After a html file is generated your webserver will serve that file instead of processing the comparatively heavier and more expensive WordPress PHP scripts. Active installations: 2+ million

managed WordPress SECURITY

Get Healthy, Stay Healthy! A healthier online business starts today and it begins with your WordPress websites. Let’s solve all your Unrestricted Access MAY 2021 issues.

BRIEF: Open and Unrestricted Access MAY 2021 to anything within a website is one thing everybody considers to be a total disaster. Many employees have come to rely on the Internet both for work and day-to-day life. As such, they demand unrestricted access at work, and many company bosses have obliged. Without the knowledge to them, however, there may be a risk associated with this.

unrestricted access may 2021 - wp security circumvention

What is Unauthenticated Insecure Deserialisation?

Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS) attack, or even execute arbitrary code upon it being deserialized. If the function that is responsible for converting serial data into a structured object assumes that the data is trusted, an attacker may format the serial data in such a way that the result of deserialization is malicious. Unfortunately, many standard deserialization functions in programming languages assume that the data is safe.

What is Unauthenticated Backup Download?

The plugin does not restrict access to a BACKUP file containing sensitive information, such as the internal path of backups, which may then allow unauthenticated users to download them.

What is Unrestricted File Upload?

By exploiting this vulnerability, attackers could simply upload files of any type, bypassing all restrictions placed regarding the allowed upload-able file types on a website. By doing this, it allows an attacker to inject malicious content such as web shells into the sites, and providing a method for initial access into the system.

What is Login Rate Limiting Bypass?

When the plugin is configured with a custom header in its Trusted IP Origins setting (e.g X-Forwarded-For), attackers could bypass the protection offered by tampering the header sent in requests. When the plugin is configured to accept an arbitrary header as client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does never reach the maximum allowed retries.

What is Improper Authorisation Check?

An attacker could leverage these issues to dump the database including administrative user credentials, to steal cookie-based authentication credentials, or launch other attacks. An anonymous user may create a new dive entry with a crafted HTTP POST.

 

Contact us today for a FREE AUDIT!

Do you suspect any Unrestricted Access MAY 2021 Security Circumvention within your WordPress?

Related Posts to MANAGED WordPress Security:

WP BAC OCT 2024: 97 Brutal WP Broken Access Control

WP BAC OCT 2024: WP Broken Access Control Managed WP/Woo Security Report Be informed about the latest WP Broken Access Control, identified and reported publicly. WP BAC OCT 2024 is a -45% DECREASE compared to previous month. Consider for your online safety, a managed WP/Woo security AUDIT, – OR – switching with a TOP10LIST alternative…

WP RCE OCT 2024: 6 Dirty WP Remote Code Execution

WP RCE OCT 2024 WordPress Remote Code Execution Be informed about the latest WP Remote Code Execution, identified and reported publicly. WP RCE OCT 2024 is a -14% DECREASE compared to previous month. Consider for your online safety, a security AUDIT, – OR – switching with a TOP10LIST alternative WP Security Plugin – OR -…

WP XSS OCT 2024: 250 Effortless WP Cross-Site Scripting

WP XSS OCT 2024 – WP Cross-Site Scripting Managed WP/Woo Security Report Be informed about the latest WP Cross-Site Scripting, identified and reported publicly. WP XSS OCT 2024 is similarly HIGH compared to previous month. Consider for your online safety, a managed WP/Woo security AUDIT, – OR – switching with a TOP10LIST alternative WP Security…

Unauthenticated WP OCT 2024 – 48 Security Abuse

Unauthenticated WP OCT 2024 Managed WordPress / WooCommerce Security Report Be informed about the latest Unauthenticated WP OCT 2024 – WP Security Circumvention, identified and reported publicly. It is a -26% DECREASE compared to previous month, as specifically going around existing security. Consider for your online safety, a managed WP/Woo security AUDIT, – OR –…