I know it can be frustrating to have to update your install but in my eyes finding and patching these exploits is a good thing. Recently a lot of security professionals and companies have been researching and discovering items in WHMCS and other hosting industry softwares. The fact WHMCS is acting and releasing these fixes in a timely manor is a good thing.
Obviously we would all hope for flawless products but thats a pipe dream. Even more when your product has to connect and interact with so many other products. Do not be shocked if there are not a few other "roll up" updates coming down the road from WHMCS.
Praise isn't warranted when they knew stuff like this existed, but they hid behind the "encoded" veil. These fixes are released multiple HOURS after it is PUBLICLY released on sites such as localhost.
A lot of exploits in the past have been brought to the attention of WHMCS first, they deem "not worth the effort" and then said security individual posts it public, and only THEN do they tend to fix the issues.
They need to stop hiding behind a veil of "we're encoded, totally safe!" when in reality it doesn't work that way.
3 exploits in a month, all SQL injection exploits. Same exact thing, just inserted into different forms. GJ WHMCS, you fixed the one thing made public but pretended all the other areas of exploit for
the same damn thing didn't exist. Guess what, people found them!
Especially with cPanel's name on WHMCS, they better get their act together. Being encoded cannot be seen as "secure" coding.