• Resolved Cekker

    (@cekker)


    Hello, my hosting’s antimalware is reporting this file

    /wp-content/plugins/duplicator/installer/dup-installer/assets/inc.libs.js

    because (they say) it contains a known vulnerability (CVE-2021-41183) in jQuery UI, fixed in 1.13 and later versions.

    Is there an update planned for the jQuery UI library for better security?

    Waiting for your kind feedback. Thank you.

    NOTE: Everything is updated to the latest versions (WP 6.8.3, Duplicator 1.5.13.3).

Viewing 5 replies - 1 through 5 (of 5 total)
  • Plugin Support mohammedeisa

    (@mohammedeisa)

    Hello @cekker,

    Thanks for reaching out to us.

    We are working on this topic. Please wait, and I will get back to you once I have updates.

    Thanks for your patience.

    Plugin Support mohammedeisa

    (@mohammedeisa)

    Hello @cekker,

    Our team addressed this issue, and will resolve it in the next Duplicator release.

    Thanks for reporting this issue. Please don’t hesitate to contact us if you have any questions. We are happy to help.

    Thanks!

    Plugin Support mohammedeisa

    (@mohammedeisa)

    Hi @cekker ,

    We just launched a new release that comes with a fix to your issue.

    Please update Duplicator Pro to the latest version, and let me know if this vulnerability is resolved.

    I’m looking forward to hearing back from you.

    Thanks!

    Thread Starter Cekker

    (@cekker)

    Thank you!

    I updated the plugin and the hosting antivirus now reports NO infected or suspicious files.

    Problem fixed with your last release! The topic can be marked as resolved.

    • This reply was modified 1 month, 4 weeks ago by Cekker.
    Plugin Support mohammedeisa

    (@mohammedeisa)

    @cekker Thanks for confirming that the current release resolved the issue. I hope that you enjoy using Duplicator.

    Please don’t hesitate to contact us if you have any questions. We are happy to help.

    Thanks!

Viewing 5 replies - 1 through 5 (of 5 total)

You must be logged in to reply to this topic.