Friday, April 11, 2025
HomeCVE/vulnerabilityHackers Launching Website Take Over Attack by Exploiting Multiple Zero-day Vulnerabilities -...

Hackers Launching Website Take Over Attack by Exploiting Multiple Zero-day Vulnerabilities – 150,000 + Websites Affected

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new site take over the campaign that targeting WordPress websites by exploiting the multiple WordPress Plugin Zeroday vulnerabilities.

3 popular WordPress plug-ins are exploited as a part of this ongoing site take over attack campaign.

This campaign mainly targeting the WordPress websites and exploiting the multiple XSS vulnerabilities in the above vulnerable plugs to inject the malicious javascript.

- Advertisement - Google News

Cross-site scripting (XSS) vulnerability let an attacker inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by the victim who is visiting the target site.

In results, Attackers create a rogue administrator account to infect with a site with the backdoor for future attacks.

Plugin Zeroday Vulnerabilities

The same type of Unauthenticated Stored XSS Zero vulnerability recently patched in the Flexible Checkout Fields for WooCommerce plugin which allowed attackers to modify the plugin’s settings. 

Another Stored XSS vulnerability in one of the above Plugin Async JavaScript let attackers inject with a crafted payload to execute malicious JavaScript when a WordPress administrator views certain areas of their dashboard. 

Async Javascript plugin is currently installed on more than 100,000 WordPress sites and the Author Frank Goossens, quickly released a patch for this issue after the issues reported by Wordfence researchers.

Wordfence researchers reported 3rd unauthenticated Stored XSS in 10Web Map Builder for Google Maps, which has installed in 20,000 WordPress websites.

According to Wordfence report ” The vulnerability in 10Web Map Builder exists in the plugin’s setup process. The plugin’s setup functions are called during admin_init which, like Flexible Checkout Fields, is accessible to unauthenticated users. If an attacker injects malicious JavaScript into certain settings values, that code will execute for administrators in their dashboard as well as front-of-site visitors in some circumstances.”

10Web Map Builder for Google Maps urges users to update to version 1.0.64 as soon as possible.

Lastly, Multiple Subscriber+ Stored XSS vulnerabilities reported in Modern Events Calendar Lite which installed in 40, 000 websites.

Researchers observed that Modern Events Calendar Lite registers several AJAX actions for login in users that allowed low privileged users such as a subscriber to manipulate the data and they can be injected with various XSS payloads.

It depends on where the attacker injecting the code and this campaign currently targeting administrators to create rogue accounts for the attackers.

This vulnerability has been fixed now. Update to version 5.1.7 as soon as possible.

Also Read: WP Hardening – A Free WordPress Security Plugin to Perform Real-time Security Audit On Your WordPress Site

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity...

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...