Access violation vulnerability in 11 plugins by Inisev

Several plugins that are used on WordPress websites created by Inisev have a security vulnerability that can allow attackers with very limited permissions, such as subscribers, to install certain plugins from Inisev without authorization. This is because of a missing capability check on the handle_installation function, which is called using the inisev_installation AJAX action, in multiple versions. It appears that CVE-2023-38514 is the same vulnerability.

Detected in:

Backup Migration fixed vulnerable versions: >= * <= 1.2.7
Backup Migration Staging fixed vulnerable versions:
BackupBliss – Backup Migration Staging fixed vulnerable versions:
Clone fixed vulnerable versions: >= * <= 2.3.7
Enhanced Text Widget fixed vulnerable versions: >= * <= 1.5.7
Pop-Up Chop Chop fixed vulnerable versions:
Redirection fixed vulnerable versions:
RSS Redirect & Feedburner Alternative fixed vulnerable versions: >= * <= 3.7
Social Media Share Buttons & Social Sharing Icons fixed vulnerable versions: >= * <= 2.8.1
SSL Mixed Content Fix fixed vulnerable versions: >= * <= 3.2.3
Ultimate Posts Widget fixed vulnerable versions: >= * <= 2.2.4
Yoast Duplicate Post fixed vulnerable versions:
Social Share Icons & Social Share Buttons open vulnerable versions: >= * <= 3.5.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.