{"id":9694,"date":"2025-03-25T02:18:20","date_gmt":"2025-03-25T00:18:20","guid":{"rendered":"https:\/\/nl-hh.eu\/index.php\/2025\/03\/25\/site-vulnerabilities-found-17\/"},"modified":"2025-03-25T02:18:20","modified_gmt":"2025-03-25T00:18:20","slug":"site-vulnerabilities-found-17","status":"publish","type":"post","link":"https:\/\/nl-hh.eu\/index.php\/2025\/03\/25\/site-vulnerabilities-found-17\/","title":{"rendered":"Site vulnerabilities found"},"content":{"rendered":"<p>Plesk<\/p>\n<p>        \/* Stop WebKit from changing text sizes *\/<br \/>\n        body,<br \/>\n        table,<br \/>\n        td,<br \/>\n        a {<br \/>\n            -webkit-text-size-adjust: 100%;<br \/>\n            -ms-text-size-adjust: 100%;<br \/>\n        }<br \/>\n        body {<br \/>\n            height: 100% !important;<br \/>\n            margin: 0 !important;<br \/>\n            padding: 0 !important;<br \/>\n            width: 100% !important;<br \/>\n        }<\/p>\n<p>        \/* Removes spacing between tables in Outlook 2007+ *\/<br \/>\n        table,<br \/>\n        td {<br \/>\n            mso-table-lspace: 0pt;<br \/>\n            mso-table-rspace: 0pt;<br \/>\n        }<br \/>\n        img {<br \/>\n            border: 0;<br \/>\n            line-height: 100%;<br \/>\n            text-decoration: none;<br \/>\n            -ms-interpolation-mode: bicubic;<br \/>\n            \/* Smoother rendering in IE *\/<br \/>\n        }<br \/>\n        table {<br \/>\n            border-collapse: collapse !important;<br \/>\n        }<\/p>\n<p>        \/* iOS Blue Links *\/<br \/>\n        a[x-apple-data-detectors] {<br \/>\n            color: inherit !important;<br \/>\n            text-decoration: none !important;<br \/>\n            font-size: inherit !important;<br \/>\n            font-family: inherit !important;<br \/>\n            font-weight: inherit !important;<br \/>\n            line-height: inherit !important;<br \/>\n        }<\/p>\n<p>        \/* Table fix for Outlook *\/<br \/>\n        table {<br \/>\n            border-collapse: separate;<br \/>\n        }<br \/>\n        .ExternalClass p,<br \/>\n        .ExternalClass span,<br \/>\n        .ExternalClass font,<br \/>\n        .ExternalClass td {<br \/>\n            line-height: 100%;<br \/>\n        }<br \/>\n        .ExternalClass {<br \/>\n            width: 100%;<br \/>\n        }<\/p>\n<p>        \/* Mobile Styling *\/<br \/>\n        @media screen and (max-width: 525px) {<br \/>\n            .wrapper {<br \/>\n                width: 100% !important;<br \/>\n                max-width: 100% !important;<br \/>\n            }<br \/>\n            .hide-element {<br \/>\n                display: none !important;<br \/>\n            }<br \/>\n            .no-padding {<br \/>\n                padding: 0 !important;<br \/>\n            }<br \/>\n            .img-max {<br \/>\n                max-width: 100% !important;<br \/>\n                width: 100% !important;<br \/>\n                height: auto !important;<br \/>\n            }<br \/>\n            .table-max {<br \/>\n                width: 100% !important;<br \/>\n            }<br \/>\n            .mobile-btn-container {<br \/>\n                margin: 0 auto;<br \/>\n                width: 100% !important;<br \/>\n            }<br \/>\n            .mobile-btn {<br \/>\n                padding: 15px !important;<br \/>\n                border: 0 !important;<br \/>\n                font-size: 16px !important;<br \/>\n                display: block !important;<br \/>\n            }<br \/>\n        }<\/p>\n<p>        \/* iPads (landscape) Styling *\/<br \/>\n        @media handheld,<br \/>\n        all and (device-width: 768px) and (device-height: 1024px) and =<br \/>\n(orientation : landscape) {<br \/>\n            .wrapper-ipad {<br \/>\n                max-width: 278px !important;<br \/>\n            }<br \/>\n            .table-max-ipad {<br \/>\n                max-width: 465px !important;<br \/>\n            }<br \/>\n        }<\/p>\n<p>        \/* iPads (portrait) Styling *\/<br \/>\n        @media handheld,<br \/>\n        all and (device-width: 768px) and (device-height: 1024px) and =<br \/>\n(orientation : portrait) {<br \/>\n            .wrapper-ipad {<br \/>\n                max-width: 278px !important;<br \/>\n            }<br \/>\n            .table-max-ipad {<br \/>\n                max-width: 465px !important;<br \/>\n            }<br \/>\n        }<\/p>\n<p>                    &nbsp;<\/p>\n<p>                            <img \/><\/p>\n<p>                    &nbsp;<\/p>\n<p>                        WP Toolkit has detected new vulnerabilities on =<br \/>\nWordPress sites under your care. It is strongly recommended to update or =<br \/>\ndisable vulnerable assets on these sites. You can also configure WP =<br \/>\nToolkit to perform automatic actions when vulnerabilities are detected. =<\/p>\n<p>The following vulnerabilities need your attention because they =<br \/>\nhave to be addressed manually:<\/p>\n<p>                                    &nbsp;<br \/>\n                                    Site: <span>derschuster.hamburg<\/span><br \/>\n                                    Open in panel<br \/>\n                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    <span><br \/>\n                            Critical<br \/>\n                        <\/span><\/p>\n<p>                                        <span>WordPress Slider Revolution plugin &lt; 6.7.0 &#8211; Unauthenticated =<br \/>\nBroken Access Control vulnerability<\/span><\/p>\n<div>Unauthenticated Broken Access Control =<br \/>\nvulnerability discovered by Rafie Muhammad (Patchstack) in WordPress =<br \/>\nPlugin Slider Revolution (versions &lt; 6.7.0)<\/div>\n<p>                                       =20<br \/>\n                                        <b>Source: Patchstack, Wordfence<\/b><\/p>\n<p>                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    Site: <span>derschuster.hamburg<\/span><br \/>\n                                    Open in panel<br \/>\n                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    <span><br \/>\n                            Medium<br \/>\n                        <\/span><\/p>\n<p>                                        <span>Slider Revolution &lt; 6.6.19 &#8211; Authenticated (Author+) PHP =<br \/>\nObject Injection<\/span><\/p>\n<div>The Slider Revolution plugin for WordPress is =<br \/>\nvulnerable to PHP Object Injection in all versions up to 6.6.19 =<br \/>\n(exclusive) via deserialization of untrusted input when importing a new =<br \/>\nslider. This makes it possible for authenticated attackers, with =<br \/>\nauthor-level access and above, to inject a PHP Object. No known POP =<br \/>\nchain is present in the vulnerable plugin. If a POP chain is present via =<br \/>\nan additional plugin or theme installed on the target system, it could =<br \/>\nallow the attacker to delete arbitrary files, retrieve sensitive data, =<br \/>\nor execute code.<\/div>\n<div>This record contains material that is =<br \/>\nsubject to copyright.<\/div>\n<p>                                        <b>Source: Wordfence<\/b><\/p>\n<p>                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    Site: <span>derschuster.hamburg<\/span><br \/>\n                                    Open in panel<br \/>\n                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    <span><br \/>\n                            Medium<br \/>\n                        <\/span><\/p>\n<p>                                        <span>WordPress Lightbox Gallery plugin &lt; 0.9.5 &#8211; Authenticated =<br \/>\n(Contributor+) Stored Cross-Site Scripting via Shortcode =<br \/>\nvulnerability<\/span><\/p>\n<div>Authenticated (Contributor+) Stored Cross-Site =<br \/>\nScripting via Shortcode vulnerability discovered by Lana Codes in =<br \/>\nWordPress Plugin Lightbox Photo Gallery (versions &lt; 0.9.5)<\/div>\n<p>                                       =20<br \/>\n                                        <b>Source: Patchstack, Wordfence<\/b><\/p>\n<p>                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    Site: <span>derschuster.hamburg<\/span><br \/>\n                                    Open in panel<br \/>\n                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    <span><br \/>\n                            Medium<br \/>\n                        <\/span><\/p>\n<p>                                        <span>WordPress Lightbox Photo Gallery plugin &lt; 0.9.5 &#8211; Contributor+ =<br \/>\nStored XSS via Shortcode vulnerability<\/span><\/p>\n<div>Contributor+ Stored XSS via Shortcode =<br \/>\nvulnerability discovered by an unknown individual in WordPress Plugin =<br \/>\nLightbox Photo Gallery (versions &lt;=3D 0.9.4)<\/div>\n<p>                                       =20<br \/>\n                                        <b>Source: Patchstack<\/b><\/p>\n<p>                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    Site: <span>derschuster.hamburg<\/span><br \/>\n                                    Open in panel<br \/>\n                                    &nbsp;<\/p>\n<p>                                    &nbsp;<br \/>\n                                    <span><br \/>\n                            Medium<br \/>\n                        <\/span><\/p>\n<p>                                        <span>WordPress Slide Anything plugin &lt;=3D 2.4.9 &#8211; iFrame Injection =<br \/>\nto Cross-Site Scripting (XSS) vulnerability<\/span><\/p>\n<div>iFrame Injection to Cross-Site Scripting (XSS) =<br \/>\nvulnerability discovered by FearZzZz in WordPress Plugin Slide Anything =<br \/>\n(versions &lt;=3D 2.4.9)<\/div>\n<p>                                       =20<br \/>\n                                        <b>Source: Patchstack, Wordfence<\/b><\/p>\n<p>                                    &nbsp;<\/p>\n<p>More vulnerabilities were =<br \/>\nfound, please go to WP Toolkit for the full list. <\/p>\n<p>Automatic =<br \/>\nactions can be defined on the site autoupdate policy screen.             =<\/p>\n<p>                    &nbsp;<\/p>\n<p>                                        <img \/><\/p>\n<p>                                &nbsp;<\/p>\n<p>                                        <img \/><\/p>\n<p>                                &nbsp;<\/p>\n<p>                                        <img \/><\/p>\n<p>                                &nbsp;<\/p>\n<p>                                        <img \/><\/p>\n<p>                    &nbsp;<\/p>\n<p>                            WebPros International GmbH<\/p>\n<p>                        &nbsp;&nbsp;&nbsp;<br \/>\n                        Vordergasse 59<br \/>\n                        &nbsp;&nbsp;&nbsp;<br \/>\n                        Schaffhausen, CH 8200<br \/>\n                        &nbsp;&nbsp;&nbsp;<br \/>\n                        Switzerland<\/p>\n<p>                    &nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plesk \/* Stop WebKit from changing text sizes *\/ body, table, td, a { -webkit-text-size-adjust: 100%; -ms-text-size-adjust: 100%; } body { height: 100% !important; margin: 0 !important; padding: 0 !important; width: 100% !important; } \/* Removes spacing between tables in Outlook 2007+ *\/ table, td { mso-table-lspace: 0pt; mso-table-rspace: 0pt; } img { border: 0; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9694","post","type-post","status-publish","format-standard","hentry","category-allgemein"],"_links":{"self":[{"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/posts\/9694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/comments?post=9694"}],"version-history":[{"count":0,"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/posts\/9694\/revisions"}],"wp:attachment":[{"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/media?parent=9694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/categories?post=9694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nl-hh.eu\/index.php\/wp-json\/wp\/v2\/tags?post=9694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}