<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>plugins — LowEndSpirit DEV</title>
        <link>https://dev.lowendspirit.com/index.php?p=/</link>
        <pubDate>Wed, 08 Apr 2026 19:51:15 +0000</pubDate>
        <language>en</language>
            <description>plugins — LowEndSpirit DEV</description>
    <atom:link href="https://dev.lowendspirit.com/index.php?p=/discussions/tagged/plugins/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>WordPress Plugins and Themes vulnerability: March Edition</title>
        <link>https://dev.lowendspirit.com/index.php?p=/discussion/3817/wordpress-plugins-and-themes-vulnerability-march-edition</link>
        <pubDate>Tue, 01 Mar 2022 22:54:14 +0000</pubDate>
        <category>WordPress</category>
        <dc:creator>vyas</dc:creator>
        <guid isPermaLink="false">3817@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>This is the Motherload</p>

<p><a href="https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a" rel="nofollow">https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a</a></p>

<p>From the post</p>

<blockquote><div>
  <p>The plugins and themes use an insecure version of the Freemius Framework, which is lacking CSRF and/or authorisation in some of its AJAX actions. As a result, any authenticated users, such as subscriber could access the debug logs. Unauthenticated attackers could also make a logged in admin toggle the debug mode via a CSRF attack.</p>
</div></blockquote>
]]>
        </description>
    </item>
    <item>
        <title>Attack on ~ 1.5 Mn WordPress Sites</title>
        <link>https://dev.lowendspirit.com/index.php?p=/discussion/3621/attack-on-1-5-mn-wordpress-sites</link>
        <pubDate>Fri, 10 Dec 2021 17:46:47 +0000</pubDate>
        <category>WordPress</category>
        <dc:creator>vyas</dc:creator>
        <guid isPermaLink="false">3621@/index.php?p=/discussions</guid>
        <description><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/massive-attack-against-16-million-wordpress-sites-underway/" rel="nofollow">https://www.bleepingcomputer.com/news/security/massive-attack-against-16-million-wordpress-sites-underway/</a></p>

<p>Check the themes and plugins in the list. If present. maybe disable!</p>

<p>The affected plugins and their versions are:</p>

<pre spellcheck="false" tabindex="0">PublishPress Capabilities
Kiwi Social Plugin
Pinterest Automatic
WordPress Automatic 
</pre>

<p>The targeted Epsilon Framework themes are:</p>

<pre spellcheck="false" tabindex="0">Shapely
NewsMag
Activello
Illdy
Allegiant
Newspaper X
Pixova Lite
Brilliance
MedZone Lite
Regina Lite
Transcend
Affluent
Bonkers
Antreas
NatureMag Lite – No patch available
</pre>

<p>Among the top 10 attack machines have <br />
Contabo and OVH ips</p>

<p>( I had read 1.9 Mn sites elsewhere, the bleeping computer link mentions 1.6 Mn. Updated the title)</p>
]]>
        </description>
    </item>
    <item>
        <title>Any Direct Admin Backup Plugins that supports Debian</title>
        <link>https://dev.lowendspirit.com/index.php?p=/discussion/2343/any-direct-admin-backup-plugins-that-supports-debian</link>
        <pubDate>Wed, 30 Dec 2020 13:40:29 +0000</pubDate>
        <category>General</category>
        <dc:creator>sweatbar</dc:creator>
        <guid isPermaLink="false">2343@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Hello folks,</p>

<p>Do you know any backup plugins for Direct Admin that supports FTP Backups which runs on Debian 10 ?<br />JetBackup - Not Supported<br />Dabackup- No remote ftp backup</p>
]]>
        </description>
    </item>
   </channel>
</rss>
