Various Plugins <= Various Version - Use of Polyfill.io

5.3
Use of Less Trusted Source
CVSS 5.3 (Medium)
Publicly Published June 25, 2024
Last Updated July 8, 2024

Description

Multiple plugins for WordPress are vulnerable to malicious redirection in various versions. This is due to the use of Polyfill.io. Polyfill.io is a JavaScript library used to streamline delivery of content across older browsers and was taken over by malicious threat actors that used the service to redirect victims to malicious websites. While many WordPress plugins utilize Polyfill.io, not all of them may have been delivering malicious content. Regardless, it is recommended to update to a version of the plugin where Polyfill is no longer used or manually remove the use of Polyfill.io from the plugin.

References

Share

Vulnerability Details for Registration, User Profile, Membership, Content Restriction, User Directory, and Frontend Post Submission – WP User Frontend

Software Type Plugin
Software Slug wp-user-frontend (view on wordpress.org)
Patched? Yes
Remediation Update to version 4.0.8, or a newer patched version
Affected Version
  • <= 4.0.7
Patched Version
  • 4.0.8

5 other affected software packages

Software Type Plugin
Software Slug digital-river-global-commerce (view on wordpress.org)
Patched? No
Remediation No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected Version
  • All Versions
Software Type Plugin
Software Slug stepbyteservice-openstreetmap (view on wordpress.org)
Patched? No
Remediation No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected Version
  • All Versions
Software Type Plugin
Software Slug woocommerce-google-adwords-conversion-tracking-tag (view on wordpress.org)
Patched? Yes
Remediation Update to version 1.43.4, or a newer patched version
Affected Version
  • <= 1.43.3
Patched Version
  • 1.43.4
Software Type Plugin
Software Slug eid-easy-qualified-electonic-signature (view on wordpress.org)
Patched? Yes
Remediation Update to version 3.3.1, or a newer patched version
Affected Version
  • <= 3.3.0
Patched Version
  • 3.3.1
Software Type Plugin
Software Slug weforms (view on wordpress.org)
Patched? Yes
Remediation Update to version 1.6.24, or a newer patched version
Affected Version
  • <= 1.6.23
Patched Version
  • 1.6.24

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation