Site icon API Security Blog

Wordfence Intelligence Weekly WordPress Vulnerability Report (Mar 20, 2023 to Mar 26, 2023)

Last week, there were 80 vulnerabilities disclosed in 69 WordPress Plugins and 1 WordPress theme that have been added to the Wordfence Intelligence Vulnerability Database, and there were 31 Vulnerability Researchers that contributed to WordPress Security last week. **Review those vulnerabilities in this report now to ensure your site is not affected.**

Our mission with Wordfence Intelligence is to make valuable vulnerability information easily accessible to everyone, like the WordPress community, so individuals and organizations alike can utilize that data to make the internet more secure. That is why the Wordfence Intelligence user interface and vulnerability API are completely free to access and utilize both personally and commercially, and why we are running this weekly vulnerability report.

_[Click here to sign-up for our mailing list]() to receive weekly vulnerability reports like this and important WordPress Security reports in your inbox the moment they are published. _

* * *

### New Firewall Rules Deployed Last Week

The Wordfence Threat Intelligence Team reviews each vulnerability to determine impact and severity, along with assessing the likelihood of exploitation, to verify that the Wordfence Firewall provides sufficient protection.

The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week:

* [WooCommerce Payments <= 5.6.1 -Authentication Bypass and Privilege Escalation ]()
* The Wordfence Firewall has blocked** 57,136** **exploit attempts** targeting this vulnerability since its release to premium, care, and response customers on March 23, 2023.
* WAF-RULE-569 – Data redacted while we work with the developer to ensure the vulnerability protected by this WAF rule gets patched.
* [SEO Plugin by Squirrly SEO <= 12.1.20 – Missing Authorization]()

Wordfence Premium, Care, and Response customers received this protection immediately, while users still running the free version of Wordfence will receive this enhanced protection after a 30 day delay.

* * *

### Total Unpatched & Patched Vulnerabilities Last Week

**Patch Status** | **Number of Vulnerabilities**
—|—
Unpatched | 27
Patched | 53

* * *

### Total Vulnerabilities by CVSS Severity Last Week

**Severity Rating** | **Number of Vulnerabilities**
—|—
Low Severity | 0
Medium Severity | 70
High Severity | 9
Critical Severity | 1

* * *

### Total Vulnerabilities by CWE Type Last Week

**Vulnerability Type by CWE** | **Number of Vulnerabilities**
—|—
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 39
Cross-Site Request Forgery (CSRF) | 18
Missing Authorization | 10
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) | 4
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) | 3
Improper Neutralization of Formula Elements in a CSV File | 2
Authentication Bypass Using an Alternate Path or Channel | 1
Deserialization of Untrusted Data | 1
Information Exposure | 1
Unrestricted Upload of File with Dangerous Type | 1

* * *

### Researchers That Contributed to WordPress Security Last Week

**Researcher Name** | **Number of Vulnerabilities**
—|—
[Lana Codes]() | 10
[Mika]() | 7
[yuyudhn]() | 6
[Joshua Martinelle]() | 5
[Erwan LR]() | 4
[Yuki Haruma]() | 3
[Cat]() | 3
[Varun]() | 2
[Rafshanzani Suhada]() | 2
[Rio Darmawan]() | 2
[thiennv]() | 2
[Shreya Pohekar]() | 2
[minhtuanact]() | 2
[Vaibhav Rajput]() | 1
[Abdi Pranata]() | 1
[Nguyen Anh Tien]() | 1
[Michael Mazzolini]() | 1
[Fariq Fadillah Gusti Insani]() | 1
[Rafie Muhammad]() | 1
[Flaviu Popescu]() | 1
[rSolutions Security Team]() | 1
[ipatelsumit]() | 1
[Nithissh S]() | 1
[Bartłomiej Marek]() | 1
[NeginNrb]() | 1
[Pavitra Tiwari]() | 1
[Muhammad Daffa]() | 1
[Cyxow]() | 1
[Dave Jong]() | 1
[R3zk0n]() | 1
[Karol Mazurek]() | 1

_Are you a security researcher who would like to be featured in our weekly vulnerability report?_ You can responsibly disclose your WordPress vulnerability discoveries to us and [obtain a CVE ID through this form](). Responsibly disclosing your vulnerability discoveries to us will also get your name added on the [Wordfence Intelligence leaderboard]() along with being mentioned in our weekly vulnerability report.

* * *

### WordPress Plugins with Reported Vulnerabilities Last Week

**Software Name** | **Software Slug**
—|—
Advance WordPress Search Plugin | [th-advance-product-search]()
All-In-One Security (AIOS) – Security and Firewall | [all-in-one-wp-security-and-firewall]()
BigContact Contact Page | [bigcontact]()
Branded Social Images – Open Graph Images with logo and extra text layer | [branded-social-images]()
CBX Currency Converter | [cbcurrencyconverter]()
Contact Form Email | [contact-form-to-email]()
Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms | [fluentform]()
ConvertBox Auto Embed WordPress plugin | [convertbox-auto-embed]()
Custom Field Template | [custom-field-template]()
Cyberus Key | [cyberus-key]()
Disqus Conditional Load | [disqus-conditional-load]()
Easy Table of Contents | [easy-table-of-contents]()
Enhanced Plugin Admin | [enhanced-plugin-admin]()
Event Manager and Tickets Selling Plugin for WooCommerce | [mage-eventpress]()
Events Made Easy | [events-made-easy]()
Export Users Data Distinct | [export-users-data-distinct]()
Floating Cart and Menu Cart for WooCommerce | [th-all-in-one-woo-cart]()
Gallery by BestWebSoft – Customizable Image and Photo Galleries for WordPress | [gallery-plugin]()
GamiPress – Youtube integration | [gamipress-youtube-integration]()
GiveWP – Donation Plugin and Fundraising Platform | [give]()
Google XML Sitemap for Mobile | [google-mobile-sitemap]()
Hummingbird – Optimize Speed, Enable Cache, Minify CSS & Defer Critical JS | [hummingbird-performance]()
I Recommend This | [i-recommend-this]()
If Menu – Visibility control for Menus | [if-menu]()
InPost Gallery | [inpost-gallery]()
JS Job Manager | [js-jobs]()
JetEngine | [jet-engine]()
Kanban Boards for WordPress | [kanban]()
Klaviyo | [klaviyo]()
Lazy Social Comments | [lazy-facebook-comments]()
MDTF – Meta Data and Taxonomies Filter | [wp-meta-data-filter-and-taxonomy-filter]()
Open Graphite | [open-graphite]()
Owl Carousel | [owl-carousel]()
Pagination by BestWebSoft – Customizable WordPress Content Splitter and Navigation Plugin | [pagination]()
Photo Gallery by 10Web – Mobile-Friendly Image Gallery | [photo-gallery]()
Pricing Tables For WPBakery Page Builder (formerly Visual Composer) | [pricing-tables-for-wpbakery-page-builder]()
Product Feed PRO for WooCommerce | [woo-product-feed-pro]()
Safe SVG | [safe-svg]()
Scheduled Announcements Widget | [scheduled-announcements-widget]()
Simple Custom Author Profiles | [simple-custom-author-profiles]()
Simple Giveaways – Grow your business, email lists and traffic with contests | [giveasap]()
Simple Mobile URL Redirect | [simple-mobile-url-redirect]()
Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows | [ml-slider]()
Stock Sync for WooCommerce | [stock-sync-for-woocommerce]()
Store Locator WordPress | [agile-store-locator]()
Stylish Cost Calculator | [stylish-cost-calculator-premium]()
Team Member – Team with Slider | [team-showcase-supreme]()
Thank You Page Customizer for WooCommerce – Increase Your Sales | [woo-thank-you-page-customizer]()
Time Sheets | [time-sheets]()
TreePress – Easy Family Trees & Ancestor Profiles | [treepress]()
User Registration – Custom Registration Form, Login Form And User Profile For WordPress | [user-registration]()
Userlike – WordPress Live Chat plugin | [userlike]()
Variation Swatches for WooCommerce | [th-variation-swatches]()
Vertical scroll recent post | [vertical-scroll-recent-post]()
VigilanTor | [vigilantor]()
W4 Post List | [w4-post-list]()
WP Content Filter – Censor All Offensive Content From Your Site | [wp-content-filter]()
WP Popup Banners | [wp-popup-banners]()
WP VR – 360 Panorama and Virtual Tour Builder For WordPress | [wpvr]()
Waiting: One-click countdowns | [waiting]()
Wbcom Designs – BuddyPress Activity Social Share | [bp-activity-social-share]()
Weather Station | [live-weather-station]()
WooCommerce JazzCash Gateway Plugin | [jazzcash-woocommerce-gateway]()
WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo | [woocommerce-payments]()
WordPress Amazon S3 Plugin | [wp-s3]()
WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg | [groundhogg]()
WordPress Pinterest Plugin – Make a Popup, User Profile, Masonry and Gallery Layout | [gs-pinterest-portfolio]()
amr users | [amr-users]()
eRoom – Zoom Meetings & Webinars | [eroom-zoom-meetings-webinar]()

* * *

### WordPress Themes with Reported Vulnerabilities Last Week

**Software Name** | **Software Slug**
—|—
Resoto | [resoto]()

* * *

### Vulnerability Details

#### [WooCommerce Payments 4.8.0 – 5.6.1 Authentication Bypass and Privilege Escalation]()

**Affected Software**: [WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo]()
**CVE ID**: CVE Unknown
**CVSS Score**: 9.8 (Critical)
**Researcher/s**: [Michael Mazzolini]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Waiting: One-click countdowns <= 0.6.2 – Authenticated (Subscriber+) SQL Injection via ‘pbc_down[meta][id]’]()

**Affected Software**: [Waiting: One-click countdowns]()
**CVE ID**: CVE-2023-28659
**CVSS Score**: 8.8 (High)
**Researcher/s**: [Joshua Martinelle]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [WP Popup Banners <= 1.2.5 – Authenticated (Subscriber+) SQL Injection via ‘value’]()

**Affected Software**: [WP Popup Banners]()
**CVE ID**: CVE-2023-28661
**CVSS Score**: 8.8 (High)
**Researcher/s**: [Joshua Martinelle]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Events Made Easy <= 2.3.14 – Authenticated (Subscriber+) SQL Injection via ‘search_name’]()

**Affected Software**: [Events Made Easy]()
**CVE ID**: CVE-2023-28660
**CVSS Score**: 8.8 (High)
**Researcher/s**: [Joshua Martinelle]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Crocoblock JetEngine <= 3.1.3 – Authenticated(Author+) Arbitrary File Upload to Remote Code Execution]()

**Affected Software**: [JetEngine]()
**CVE ID**: CVE-2023-1406
**CVSS Score**: 8.8 (High)
**Researcher/s**: [R3zk0n]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Pricing Tables For WPBakery Page Builder (formerly Visual Composer) <= 2.0 – Authenticated (Subscriber+) Local File Inclusion via Shortcode]()

**Affected Software**: [Pricing Tables For WPBakery Page Builder (formerly Visual Composer)]()
**CVE ID**: CVE-2023-1274
**CVSS Score**: 8.1 (High)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [User Registration <= 2.3.2.1 – PHP Object Injection]()

**Affected Software**: [User Registration – Custom Registration Form, Login Form And User Profile For WordPress]()
**CVE ID**: CVE-2023-27459
**CVSS Score**: 7.5 (High)
**Researcher/s**: [Rafie Muhammad]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Stylish Cost Calculator < 7.9.0 – Unauthenticated Stored Cross-Site Scripting]()

**Affected Software**: [Stylish Cost Calculator]()
**CVE ID**: CVE-2023-0983
**CVSS Score**: 7.2 (High)
**Researcher/s**: [Flaviu Popescu]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Groundhogg <= 2.7.9.3 – Authenticated (Administrator)+ SQL Injection]()

**Affected Software**: [WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg]()
**CVE ID**: CVE-2023-1425
**CVSS Score**: 7.2 (High)
**Researcher/s**: [rSolutions Security Team]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [SVG Sanitizer library <= 0.15.4 – Cross-Site Scripting Bypass]()

**Affected Software**: [Safe SVG]()
**CVE ID**: CVE-2023-28426
**CVSS Score**: 7.2 (High)
**Researcher/s**: [Cyxow]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [JS Job Manager <= 2.0.0 – Missing Authorization]()

**Affected Software**: [JS Job Manager]()
**CVE ID**: CVE-2023-28689
**CVSS Score**: 6.5 (Medium)
**Researcher/s**: [Fariq Fadillah Gusti Insani]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [TH Advance WordPress Search <= 1.1.4 – Missing Authorization via settings_init]()

**Affected Software**: [Advance WordPress Search Plugin]()
**CVE ID**: CVE-2023-25969
**CVSS Score**: 6.5 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [FluentForms <= 4.3.24 – Authenticated(Contributor+) Stored Cross-Site Scripting]()

**Affected Software**: [Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms]()
**CVE ID**: CVE-2023-0546
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Vaibhav Rajput]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Vertical scroll recent post <= 14.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes]()

**Affected Software**: [Vertical scroll recent post]()
**CVE ID**: CVE-2023-23862
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [yuyudhn]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [WordPress Pinterest Plugin <= 1.6.1 – Stored (Contributor+) Cross-Site Scripting via Shortcode]()

**Affected Software**: [WordPress Pinterest Plugin – Make a Popup, User Profile, Masonry and Gallery Layout]()
**CVE ID**: CVE Unknown
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Team Member <= 4.4 – Authenticated (Editor+) Stored Cross-Site Scripting via new_style_name]()

**Affected Software**: [Team Member – Team with Slider]()
**CVE ID**: CVE-2023-23647
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Rio Darmawan]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [W4 Post List <= 2.4.5 – Authenticated (Contributor+) Stored Cross-Site Scripting via Block Options]()

**Affected Software**: [W4 Post List]()
**CVE ID**: CVE-2023-0374
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Scheduled Announcements Widget <= 0.2 – Authenticated (Contributor+) Stored Cross-Site Scripting]()

**Affected Software**: [Scheduled Announcements Widget]()
**CVE ID**: CVE-2023-0363
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [GamiPress – Youtube integration <= 1.0.7 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode]()

**Affected Software**: [GamiPress – Youtube integration]()
**CVE ID**: CVE Unknown
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: Unknown
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Pricing Tables For WPBakery Page Builder (formerly Visual Composer) <= 2.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode]()

**Affected Software**: [Pricing Tables For WPBakery Page Builder (formerly Visual Composer)]()
**CVE ID**: CVE-2023-0367
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [ConvertBox Auto Embed WordPress plugin <= 1.0.19 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode]()

**Affected Software**: [ConvertBox Auto Embed WordPress plugin]()
**CVE ID**: CVE-2023-23664
**CVSS Score**: 6.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Slider, Gallery, and Carousel by MetaSlider <= 3.29.0 – Reflected Cross-Site Scripting]()

**Affected Software**: [Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows]()
**CVE ID**: CVE-2023-1473
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Erwan LR]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [InPost Gallery <= 2.1.4.1 – Reflected Cross-Site Scripting via ‘imgurl’]()

**Affected Software**: [InPost Gallery]()
**CVE ID**: CVE-2023-28666
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Joshua Martinelle]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [MDTF – Meta Data and Taxonomies Filter <= 1.3.0.1 – Relected Cross-Site Scripting via ‘tax_name’]()

**Affected Software**: [MDTF – Meta Data and Taxonomies Filter]()
**CVE ID**: CVE-2023-28664
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Joshua Martinelle]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [WP VR <= 8.2.8 – Reflected Cross-Site Scripting]()

**Affected Software**: [WP VR – 360 Panorama and Virtual Tour Builder For WordPress]()
**CVE ID**: CVE-2023-1413
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Erwan LR]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [W4 Post List <= 2.4.5 – Reflected Cross-Site Scripting]()

**Affected Software**: [W4 Post List]()
**CVE ID**: CVE-2023-1373
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Erwan LR]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [WordPress Amazon S3 Plugin <= 1.5 – Reflected Cross-Site Scripting]()

**Affected Software**: [WordPress Amazon S3 Plugin]()
**CVE ID**: CVE-2023-0423
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [Shreya Pohekar]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [WooCommerce JazzCash Gateway Plugin <= 2.0 – Unauthenticated Cross-Site Scripting]()

**Affected Software**: [WooCommerce JazzCash Gateway Plugin]()
**CVE ID**: CVE-2022-46822
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [minhtuanact]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Open Graphite <= 1.6.0 – Reflected Cross-Site Scripting via topic parameter]()

**Affected Software**: [Open Graphite]()
**CVE ID**: CVE-2022-47439
**CVSS Score**: 6.1 (Medium)
**Researcher/s**: [minhtuanact]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Export Users Data Distinct <= 1.3 – Authenticated (Subscriber+) CSV Injection]()

**Affected Software**: [Export Users Data Distinct]()
**CVE ID**: CVE-2022-46804
**CVSS Score**: 5.8 (Medium)
**Researcher/s**: [Mika]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [amr users <= 4.59.4 – Authenticated (Subscriber+) CSV Injection]()

**Affected Software**: [amr users]()
**CVE ID**: CVE-2022-45348
**CVSS Score**: 5.8 (Medium)
**Researcher/s**: [Mika]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [Simple Giveaways <= 2.45.0 – Authenticated (Editor+) Stored Cross-Site Scripting via Form, Prize, and Sharing Method Fields]()

**Affected Software**: [Simple Giveaways – Grow your business, email lists and traffic with contests]()
**CVE ID**: CVE-2023-1122
**CVSS Score**: 5.5 (Medium)
**Researcher/s**: [Varun]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Wbcom Designs – BuddyPress Activity Social Share <= 3.5.0 – Cross-Site Request Forgery]()

**Affected Software**: [Wbcom Designs – BuddyPress Activity Social Share]()
**CVE ID**: CVE-2023-28694
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Unpatched
**Vulnerability Details:**

* * *

#### [TH Variation Swatches <= 1.2.7 – Cross-Site Request Forgery via delete_settings]()

**Affected Software**: [Variation Swatches for WooCommerce]()
**CVE ID**: CVE-2023-28688
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [CBX Currency Converter <= 3.0.3 – Cross-Site Request Forgery leading to Plugin Settings Leakage/Changes]()

**Affected Software**: [CBX Currency Converter]()
**CVE ID**: CVE-2023-28747
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Mika]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Enhanced Plugin Admin <= 1.16 – Cross-Site Request Forgery via epa_options_page]()

**Affected Software**: [Enhanced Plugin Admin]()
**CVE ID**: CVE-2023-28618
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Yuki Haruma]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Easy Table of Contents <= 2.0.45.2 – Missing Authorization via eztoc_reset_options_to_default]()

**Affected Software**: [Easy Table of Contents]()
**CVE ID**: CVE-2023-25469
**CVSS Score**: 5.4 (Medium)
**Researcher/s**: [Rafshanzani Suhada]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [TH Side Cart and Menu Cart for Woocommerce <= 1.1.1 – Missing Authorization]()

**Affected Software**: [Floating Cart and Menu Cart for WooCommerce]()
**CVE ID**: CVE-2023-25969
**CVSS Score**: 5.3 (Medium)
**Researcher/s**: [Lana Codes]()
**Patch Status**: Patched
**Vulnerability Details:**

* * *

#### [Branded Social Images <= 1.1.0 – Missing Authorization leading to Unauthenticated Plugin Settings Updates]()

**Affected Software**: [Branded Social Images – Open Graph Images with logo and extra text layer](Read More

Exit mobile version