-
Strong Testimonials Forms Spam Protection: How to Stop Fake Testimonials in WordPress

Strong Testimonials forms are different from normal contact forms. They are not only used to send a message to the site owner. They are used to collect customer feedback, reviews, ratings, names, photos, company details, and testimonial text that may later appear publicly on a website. That makes spam more risky. If fake testimonials are…
FEEDBACK LOG
The Latest
-
CVE-2023-4725 – Simple Posts Ticker < 1.1.6 - Admin+ Stored XSS
During testing, a vulnerability was found that allows, through changing the settings, to implement Stored XSS on all pages where there is a mention of the plugin. This vulnerability is available on behalf of the administrator and allows you to leave javascript “backdoor” when capturing an administrative account, which will allow account takeover. Unfiltered_html capability…
-
CVE-2023-4646 – Simple Posts Ticker < 1.1.6 - Contributor + Stored XSS via shortcode
While examining the plugin during the testing phase, we uncovered a vulnerability that enables the execution of Stored Cross-Site Scripting (XSS) attacks, accomplished by incorporating a shortcode into a new post. This vulnerability has the potential to lead to the compromise of user accounts, particularly those of contributors. Main info: CVE CVE-2023-4646 Plugin Simple Posts…
-
CVE-2023-4798 – User Avatar – Reloaded < 1.2.2 - Contributor+ Stored XSS
During the plugin’s testing phase, a vulnerability was identified that enables the execution of Stored XSS by an attacker who embeds a shortcode in a new post, potentially leading to an account takeover. Main info: CVE CVE-2023-4798 Plugin User Avatar – Reloaded Critical High Publicly Published September 25, 2023 Last Updated September 25, 2023 Researcher…
-
CVE-2023-4933 – WP Job Openings < 3.4.3 – Sensitive Data Exposure via Directory Listing
During testing, a critical vulnerability was discovered in the plugin, namely a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users…
