Wordpress Multiple Third Party Plugins Multiple Vulnerabilities
Description
Several vulnerabilities have been identified in plugins for WordPress:
- sp-client-document-manager: blind SQL injection via the "pid" parameter of the "sp-client-document-manager/ajax.php?function=thumbnails" page
- Backitup: information disclosure allowing to retrieve backup file
- Download Manager: stored cross-site scripting located in the name of the uploaded file
- mailcwp: remote file upload via the "wp-content/plugins/mailcwp/mailcwp-upload.php" script page
- fast-image-adder: remote file upload via the "url" parameter of the "fast-image-adder/fast-image-adder-uploader.php" script page
- Mobile Pack: information disclosure allowing to access to published private post
- Portfolio: cross-site request forgery via POST "wplw_hashtag" parameter of the "formulaire wp-admin/options-general.php?page=instagram-portfolio" form
- wptf-image-gallery: remote file download via the "url" parameter of the "wp-content/plugins/wptf-image-gallery/lib-mbox/ajax_load.php" script page
- Paid Memberships Pro: several cross-site scripting (CVE-2015-5532)
- Count Per Day: post authentication SQL injection exploitable via "cpd_keep_month" POST parameter of the "wp-admin/options-general.php?page=count-per-day/counter-options.php&tab=tools" page.
Proofs of concept are available.
An exploitation code is available for the vulnerability affecting mailcwp.
Vulnerable Products
Vulnerable Software: WordPress (WordPress)
Solution
New versions of the following plugins fix the vulnerabilities impacting them:- sp-client-document-manager: 2.5.4- Backitup: 1.9.2- Download Manager: 2.7.95- mailcwp: 1.110- Mobile Pack: 2.1.3- Portfolio : 1.05- Paid Memberships Pro: 1.8.4.3- Count Per Day: 3.4.1.