Beware! 0-Day Bug in WPGateway Actively Exploited in Wild & Targets 280,000 Sites

The WPGateway premium plugin has a zero-day vulnerability, which has been actively exploited by hackers to target WordPress websites.

This zero-day vulnerability in WPGateway premium plugin has been identified by cybersecurity researchers at Wordfence Threat Intelligence team.

In terms of the functionality of WPGateway, it allows administrators to simplify a number of tasks, such as:

  • Setting up sites
  • Backing up sites
  • Managing themes
  • Managing plugins

0-Day Bug

In this case, the 0-day vulnerability has been tracked as CVE-2022-3180. A rogue user with admin privileges can be added by an unauthenticated attacker to completely take over a site running this plugin without authentication.

  • CVE ID: CVE-2022-3180
  • Description: It’s a privilege escalation security flaw.
  • CVSS Score: 9.8
  • Severity: Critical

The Wordfence Threat Intelligence analysts became aware of this zero-day vulnerability on September 8, 2022 that was actively exploited by the threat actors.

A malicious user is being added to a site running the WPGateway plugin through this method in order to add a malicious administrator user.

More than 280,000 sites have been protected against more than 4.6 million attacks targeting this vulnerability by Wordfence. There has been no further information released by Wordfence regarding these attacks or details about the vulnerability.

This information has been withheld by Wordfence in order to prevent any further exploitation of the information.

It is recommended that you check the rangex username in the user account section of the Admin account on your website if you wish to determine whether or not your website has been compromised in the ongoing campaign.

A further indication is that requests to //wp-content/plugins/wpgateway/wpgateway-webservice-new.php?wp_new_credentials=1. You can check your site logs to see if your server was targeted during the attack.

Download SWG – Secure Web Filtering – Free E-book

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to Publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive documents…

1 hour ago

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users: a…

2 hours ago

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy…

2 hours ago

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven…

3 hours ago

159 CVEs Exploited in the Wild in Q1 2025, 8.3% Targeted Within 1-Day Vulnerabilities Exploited

VulnCheck's latest report for Q1 2025 has identified 159 Common Vulnerabilities and Exposures (CVEs) publicly…

3 hours ago

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly leaking…

3 hours ago