“Ninja Forms” WordPress plugin is widely used by designers/developers. Ninja Forms is a popular drag and drop WordPress form builder. There are more than a million active installations for this plugin. It is also one of the highest-rated WordPress plugins.
On January 20, 2021, Wordfence disclosed four severe vulnerabilities in the Ninja Forms WordPress plugin.
These vulnerabilities could lead to a complete WordPress site takeover and redirect site owners to malicious sites.
It is highly recommended to update the Ninja Forms plugin fully patched version (3.4.34.1) immediately.
Vulnerabilities in the Ninja Forms WordPress plugin that could allow attackers to:
- Redirect site administrators to arbitrary locations.
- Install a plugin that could be used to intercept all mail traffic.
- Retrieve the Ninja Form OAuth Connection Key that could be used to establish a connection with the Ninja Forms central management dashboard.
- Disconnect a site’s OAuth Connection if they could trick a site’s administrator into performing an action.
We detailed four flaws in the Ninja Forms plugin that granted attackers the ability to obtain sensitive information while also allowing them the ability to redirect administrative users. These flaws have been fully patched in version 3.4.34.1. We recommend that users immediately update to the latest version available, which is version 3.5.0 at the time of this publication. – Wordfence
Wordfence detected more than 70 million malicious files on 1.2 million WordPress sites in 2020. Over 17% of all infected sites had malware from a nulled plugin or theme.
Adding a firewall to the site and updating core WordPress software and plugins is a must for every WordPress Website. In addition to it, frequent virus cleaning in hosting space (Cpanel) is also mandatory.