• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable

You are here: Home / Cyber Security News / Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable

Various security vulnerabilities have been disclosed in the Ninja Sorts plugin for WordPress that could be exploited by threat actors to escalate privileges and steal delicate info.

The flaws, tracked as CVE-2023-37979, CVE-2023-38386, and CVE-2023-38393, affect versions 3.6.25 and beneath, Patchstack said in a report very last week. Ninja Types is put in on more than 800,000 sites.

A short description of every of the vulnerabilities is underneath –

  • CVE-2023-37979 (CVSS score: 7.1) – A Post-based mirrored cross-web page scripting (XSS) flaw that could let any unauthenticated person to realize privilege escalation on a target WordPress internet site by tricking privileged people to pay a visit to a specially crafted web page.
  • CVE-2023-38386 and CVE-2023-38393 – Broken entry regulate flaws in the form submissions export attribute that could allow a negative actor with Subscriber and Contributor roles to export all Ninja Forms submissions on a WordPress internet site.

Consumers of the plugin are advisable to update to model 3.6.26 to mitigate prospective threats.

Upcoming WEBINARShield In opposition to Insider Threats: Learn SaaS Security Posture Administration

Fearful about insider threats? We’ve received you included! Be part of this webinar to take a look at realistic tactics and the secrets and techniques of proactive security with SaaS Security Posture Management.

Join Nowadays

The disclosure comes as Patchstack discovered another mirrored XSS vulnerability flaw in the Freemius WordPress software program progress kit (SDK) affecting variations prior to 2.5.10 (CVE-2023-33999) that could be exploited to obtain elevated privileges.

Also found by the WordPress security organization is a critical bug in the HT Mega plugin (CVE-2023-37999) existing in versions 2.2. and under that enables any unauthenticated user to escalate their privilege to that of any job on the WordPress internet site.

Discovered this write-up exciting? Adhere to us on Twitter  and LinkedIn to study much more exceptional written content we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: «AllTech.News Know your audience: Why data communication needs to pay attention to novice users
Next Post: From atoms to materials: Algorithmic breakthrough unlocks path to sustainable technologies AllTech.News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
  • Are Forgotten AD Service Accounts Leaving You at Risk?

Copyright © 2025 · AllTech.News, All Rights Reserved.