New WAF Rules Combatting Multiple WordPress Vulnerabilities

At BitNinja, we are continually trying to ensure top-tier server security for our clients. As part of our commitment, our threat management team has recently developed and implemented three new Web Application Firewall (WAF) rules, tackling emerging WordPress vulnerabilities that target popular plugins: Shield Security, Getwid – Gutenberg Blocks, and ReviewX.

Shield Security Plugin - CVE-2023-0992

The first vulnerability concerns the Shield Security plugin for WordPress, specifically susceptible to stored Cross-Site Scripting (XSS) in versions up to and including 17.0.17 via the 'User-Agent' header. It potentially allows unauthenticated attackers to inject arbitrary web scripts into pages that execute whenever a user accesses an injected page.

To counter this XSS risk, we've designed a new WAF rule that efficiently detects and blocks any malicious attempt to exploit this particular vulnerability. As a result, businesses using the Shield Security plugin can now ensure a safe web environment for their users.

Getwid – Gutenberg Blocks Plugin - CVE-2023-1895

Another vulnerability we've addressed lies within the Getwid – Gutenberg Blocks plugin for WordPress. This plugin is vulnerable to Server Side Request Forgery (SSRF) via the get_remote_content REST API endpoint in versions up to and including 1.8.3. 

This flaw could enable authenticated attackers with subscriber-level permissions or higher to make web requests to arbitrary locations originating from the web application, potentially querying and modifying information from internal services.

Our new WAF rule effectively detects and neutralizes these SSRF attempts, significantly enhancing the security level of websites using the Getwid – Gutenberg Blocks plugin.


Protect your hosted WordPress sites with BitNinja, and leave your security concerns to us.
Join 40k+ servers in our Defense Network


ReviewX Plugin - CVE2023-2833

Lastly, the ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to and including 1.6.13 due to insufficient restriction on the 'rx_set_screen_options' function. This vulnerability might allow authenticated attackers with minimal permissions, such as subscribers, to modify their user role by supplying the 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters during a screen option update.

Our new WAF rule has been implemented to shield businesses from this potential threat, capable of detecting and blocking any illicit attempts to escalate privileges through the ReviewX plugin.

Conclusion

These vulnerabilities have indeed been rectified by the developers of each respective plugin. Therefore, updating them is the best and easiest solution against threats. However, for a hosting provider, BitNinja can be incredibly beneficial.

All three new WAF rules are included in our recommended and default-enabled rules. These can provide robust protection even for older, vulnerable, and unpatched plugins. This not only enhances the security of your clients but also simplifies your task as a hosting provider.

We strive to proactively protect your servers from emerging security threats, so you can focus on what matters most – your business. Our updated WAF rules testify to our commitment to providing our clients with comprehensive, cutting-edge security solutions.

trial
If you have no more queries, 
take the next step and sign up!
Don’t worry, the installation process is quick and straightforward!
AICPA SOC BitNinja Server Security
Privacy Shield BitNinja Server Security
GDPR BitNinja Server Security
CCPA BitNinja Server Security
2024 BitNinja. All Rights reserved.
Hexa BitNinja Server SecurityHexa BitNinja Server Security
magnifiercross