• Resolved msstm

    (@msstm)


    Hi,

    When are you planning to fix this?
    WP ULike Plugin <= 4.7.9.1 is vulnerable to Content Spoofing
    It’s been reported to you apparently 8 months ago.

    • This topic was modified 9 months, 2 weeks ago by msstm.

    The page I need help with: [log in to see the link]

Viewing 3 replies - 1 through 3 (of 3 total)
  • Thread Starter msstm

    (@msstm)

    I guess that the plugin developer doesn’t care?

    Plugin Author Alimir

    (@alimir)

    Hi,

    Thanks for reaching out. We’ve recently reviewed this report and want to clarify that it’s related to a known behavior where users can generate spam likes if voting is not restricted to logged-in users. This is not a security vulnerability but rather an abuse of open access settings.

    We’ve seen this issue before and are actively working on a more robust solution. However, it’s a bit complex due to the ability of users to change their IP addresses, which makes standard rate-limiting less effective.That said, I can assure you there is no security risk to your website or its data integrity.

    In the meantime, we strongly recommend enabling the “Logged-in users only” option in the plugin settings to prevent such behavior.

    We’re also in contact with the source of the report and will request a title change or removal once our solution is finalized.

    Thanks for your patience and understanding!

    Thanks for the response Alimir.
    Note: PatchStack has the following comment under Solutions…
    This security issue has a low severity impact and is unlikely to be exploited
    https://patchstack.com/database/wordpress/plugin/wp-ulike/vulnerability/wordpress-wp-ulike-plugin-4-7-9-1-content-spoofing-vulnerability

Viewing 3 replies - 1 through 3 (of 3 total)

The topic ‘WP ULike Plugin <= 4.7.9.1 is vulnerable to Content Spoofing’ is closed to new replies.