Researchers uncovered a new site take over the campaign that targeting WordPress websites by exploiting the multiple WordPress Plugin Zeroday vulnerabilities.
3 popular WordPress plug-ins are exploited as a part of this ongoing site take over attack campaign.
This campaign mainly targeting the WordPress websites and exploiting the multiple XSS vulnerabilities in the above vulnerable plugs to inject the malicious javascript.
Cross-site scripting (XSS) vulnerability let an attacker inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site.
In results, Attackers create a rogue administrator account to infect with a site with the backdoor for future attacks.
Plugin Zeroday Vulnerabilities
The same type of Unauthenticated Stored XSS Zero vulnerability recently patched in the Flexible Checkout Fields for WooCommerce plugin which allowed attackers to modify the plugin’s settings.Â
Another Stored XSS vulnerability in one of the above Plugin Async JavaScript let attackers inject with a crafted payload to execute malicious JavaScript when a WordPress administrator views certain areas of their dashboard.Â
Async Javascript plugin is currently installed on more than 100,000 WordPress sites and the Author Frank Goossens, quickly released a patch for this issue after the issues reported by Wordfence researchers.
Wordfence researchers reported 3rd unauthenticated Stored XSS in 10Web Map Builder for Google Maps, which has installed in 20,000 WordPress websites.
According to Wordfence report ” The vulnerability in 10Web Map Builder exists in the plugin’s setup process. The plugin’s setup functions are called during admin_init
 which, like Flexible Checkout Fields, is accessible to unauthenticated users. If an attacker injects malicious JavaScript into certain settings values, that code will execute for administrators in their dashboard as well as front-of-site visitors in some circumstances.”
10Web Map Builder for Google Maps urges users to update to version 1.0.64 as soon as possible.
Lastly, Multiple Subscriber+ Stored XSS vulnerabilities reported in Modern Events Calendar Lite which installed in 40, 000 websites.
Researchers observed that Modern Events Calendar Lite registers several AJAX actions for login in users that allowed low privileged users such as a subscriber to manipulate the data and they can be injected with various XSS payloads.
It depends on where the attacker injecting the code and this campaign currently targeting administrators to create rogue accounts for the attackers.
This vulnerability has been fixed now. Update to version 5.1.7 as soon as possible.