Tuesday, January 28, 2025
HomeVulnerability AnalysisWordPress plugin Gaint BestWebSoft's 53+ Plugin's Vulnerable to Multiple Cross Site Scripting...

WordPress plugin Gaint BestWebSoft’s 53+ Plugin’s Vulnerable to Multiple Cross Site Scripting (XSS)

Published on

SIEM as a Service

Follow Us on Google News

[jpshare]Recent Security Audits Reveal that , WordPress plugin’s software Provider BestWebSoft’s Many Plug’s are vulnerable to Multiple Cross – Site Scripting (XSS) . This application vulnerability Flow Discovered by Neven Biruski with DefenseCode ThunderScan source code security analyzer..

This vulnerability Presented in More than 50 Plugin’s Which belongs to BestWebSoft plugins that were published on the wordpress.org web site.

Most of the Affected Plug’s are well-known software vendors plugs which including Google “AdSense,LinkedIn ,Pinterest,SMTP,Google Maps,Google Analytics,Facebook Button” and more.

XSS vulnerability :

XSS (short for Cross-Site Scripting) is a widespread vulnerability that affects many web applications. The danger behind XSS is that it allows an attacker to inject content into a website and modify how it is displayed, forcing a victim’s browser to execute the code provided by the attacker while loading the page.

DefenseCode Said,The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that contains malicious JavaScript code.

If the administrator of the site makes a request to such an URL, the attacker’s code will be executed, with unrestricted access to the WordPress site in question.

Affected Plugin’s list:

DefenseCode explained Many way to affected to the user by The attacker can entice the administrator to visit the URL in various ways,including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum, or embedding it as an IMG tag source in another web page.

Administrator will visit, causing the administrator’s  browser to  request  the  URL  automatically  (due  to  missing  nonce  token  the vulnerability is directly exposed to Cross site request forgery, CSRF, attacks)

BestWebSoft responded to DefenseCode 

“We have already known about this vulnerability and some plugins have already been fixed. We will fix the rest of the plugins in their future updates.”

All users are strongly advised to update their WordPress plugins to the latest available version.

Also Read :

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Security Researchers Discover Critical RCE Vulnerability, Earned $40,000 Bounty

Cybersecurity researchers Abdullah Nawaf and Orwa Atyat, successfully escalated a limited path traversal vulnerability...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants...