Monday, April 28, 2025
HomeCVE/vulnerabilityHackers Launching Website Take Over Attack by Exploiting Multiple Zero-day Vulnerabilities -...

Hackers Launching Website Take Over Attack by Exploiting Multiple Zero-day Vulnerabilities – 150,000 + Websites Affected

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new site take over the campaign that targeting WordPress websites by exploiting the multiple WordPress Plugin Zeroday vulnerabilities.

3 popular WordPress plug-ins are exploited as a part of this ongoing site take over attack campaign.

This campaign mainly targeting the WordPress websites and exploiting the multiple XSS vulnerabilities in the above vulnerable plugs to inject the malicious javascript.

- Advertisement - Google News

Cross-site scripting (XSS) vulnerability let an attacker inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site.

In results, Attackers create a rogue administrator account to infect with a site with the backdoor for future attacks.

Plugin Zeroday Vulnerabilities

The same type of Unauthenticated Stored XSS Zero vulnerability recently patched in the Flexible Checkout Fields for WooCommerce plugin which allowed attackers to modify the plugin’s settings. 

Another Stored XSS vulnerability in one of the above Plugin Async JavaScript let attackers inject with a crafted payload to execute malicious JavaScript when a WordPress administrator views certain areas of their dashboard. 

Async Javascript plugin is currently installed on more than 100,000 WordPress sites and the Author Frank Goossens, quickly released a patch for this issue after the issues reported by Wordfence researchers.

Wordfence researchers reported 3rd unauthenticated Stored XSS in 10Web Map Builder for Google Maps, which has installed in 20,000 WordPress websites.

According to Wordfence report ” The vulnerability in 10Web Map Builder exists in the plugin’s setup process. The plugin’s setup functions are called during admin_init which, like Flexible Checkout Fields, is accessible to unauthenticated users. If an attacker injects malicious JavaScript into certain settings values, that code will execute for administrators in their dashboard as well as front-of-site visitors in some circumstances.”

10Web Map Builder for Google Maps urges users to update to version 1.0.64 as soon as possible.

Lastly, Multiple Subscriber+ Stored XSS vulnerabilities reported in Modern Events Calendar Lite which installed in 40, 000 websites.

Researchers observed that Modern Events Calendar Lite registers several AJAX actions for login in users that allowed low privileged users such as a subscriber to manipulate the data and they can be injected with various XSS payloads.

It depends on where the attacker injecting the code and this campaign currently targeting administrators to create rogue accounts for the attackers.

This vulnerability has been fixed now. Update to version 5.1.7 as soon as possible.

Also Read: WP Hardening – A Free WordPress Security Plugin to Perform Real-time Security Audit On Your WordPress Site

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...