PHP Object Injection Vulnerability in Leaky Paywall
We recently started proactively monitoring for evidence of some high risk vulnerabilities when changes are made to WordPress plugins and if we had more customers we could expand the proactive monitoring to more types of vulnerabilities. One of the types of vulnerabilities we are looking for are PHP object injection vulnerabilities since those are likely to be exploited if hackers become aware

Settings Change Vulnerability in Asgaros Forum
One of the ways we make sure we have the best data on vulnerabilities in WordPress plugins is by monitoring the WordPress Support Forum for threads possibly related to those. Through that today we ran across a thread started earlier today that seemed to indicate malicious .php files were being uploaded through the Asgaros Forum plugin. Looking over the plugin we found

Event Espresso Lite <= – Authenticates Blind SQL Injection

rk-responsive-contact-form 1.0 – Authenticated Blind SQL Injection

wordpress-gallery-transformation 1.0 – Blind SQL Injection

I Recommend This <= v3.7.7 – Authenticated SQL Injection

Link-Library <= – Authenticated SQL Injection

AddToAny Share Buttons <= 1.7.14 – Conditional Host Header Injection

Ransomware Targeting WordPress – An Emerging Threat
This entry was posted in Wordfence, WordPress Security on August 15, 2017 by Mark Maunder   0 Replies Recently, the Wordfence team has seen ransomware being used in attacks targeting WordPress. We are currently tracking a ransomware variant we are calling “EV ransomware.” The following post describes what this ransomware does and how to protect yourself from being hit by

Wordfence Unnecessarily Scares Public by Including Non-Existent Threat Against Plugin in Their WordPress Attack Report
Unfortunately much of the security industry doesn’t seem to have interest in being responsible when it comes to security information they put out, instead they throw out information without regards to accuracy, often causing the public to be concerned about non-threats (while real threats go under focused). A case in point of this is something we just looked into involving