=
|
|
=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=
=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=
=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20=20
WP Toolkit has detected new vulnerabilities on WordPress sites under your c=
are. It is strongly recommended to update or disable vulnerable assets on t=
hese sites. You can also configure WP Toolkit to perform automatic actions =
when vulnerabilities are detected.
The following vulnerabilities =
need your attention because they have to be addressed manually:
=
|
Site: kingstonmi=
sfits.co.uk |
Open in panel |
|
|
Medium
|
EventON PRO - WordPress Virtua=
l Event Calendar Plugin <=3D 4.6.8 - Cross-Site Request Forgery via admi=
n_test_email
The Eve=
ntON PRO - WordPress Virtual Event Calendar Plugin plugin for WordPress is =
vulnerable to Cross-Site Request Forgery in all versions up to, and includi=
ng, 4.6.8. This is due to missing or incorrect nonce validation on the admi=
n_test_email function. This makes it possible for unauthenticated attackers=
to send test emails to arbitrary email addresses via a forged request gran=
ted they can trick a site administrator into performing an action such as c=
licking on a link.
Source: Wordfence
|
|
More vulnerabilities were found, please go to WP Toolkit f=
or the full list.
Automatic actions can be defined on the site au=
toupdate policy screen.
|
The system generated this notice on Monday, October 7, 2024 at 12:5=
8:43 PM UTC.
=
=
=
=E2=80=9CWPT::VulnerabilityFound=E2=80=9D notifications are currently confi=
gured to have an importance of =E2=80=9CLow=E2=80=9D. =
You can change the impo=
rtance or disable this type of notification in WHM=E2=80=99s Contact Manage=
r at: https://heart.cwswebdesigns.co.uk:=
2087/scripts2/editcontact?event=3DApplication =
Do not reply to this automated message.
|
|
|
|
=
Copyright=C2=A9=C2=A01970 cPanel, L.L.C.
|
|