Thursday, October 10, 2024
HomeCyber Security NewsWordPress Plugin Flaw Exposes 90K+ Websites to Hack Attack

WordPress Plugin Flaw Exposes 90K+ Websites to Hack Attack

Published on

Over 90,000 websites are currently at risk due to a vulnerability found in the WordPress Backup Migration Plugin. This vulnerability has enabled unauthenticated remote code execution, making it possible for potential attackers to gain access to these websites.

A group of researchers from Nex Team discovered the vulnerability while participating in the Wordfence Bug Bounty program.

It’s worth noting that the CVE-2023-6553 vulnerability, which allows for remote code execution, has been assigned a critical severity score of 9.8.

- Advertisement - EHA

This vulnerability allows arbitrary PHP code to be injected and executed by unauthenticated threat actors on WordPress sites that use this plugin.

Wordpress plugin flaw
WordPress plugin flaw

The Backup Migration plugin for WordPress has a vulnerability in all versions up to and including 1.3.7, which allows attackers to execute remote code.

The vulnerability is present in the /includes/backup-heart.php file, making it possible for attackers to gain unauthorized access to sensitive data and execute malicious code on the website.

Suppose an attacker gains control of a target computer through some vulnerability and gains the power to execute commands on that remote computer. In that case, this process is called Remote Code Execution (RCE).

This indicates that BMI_ROOT_DIR is modifiable by the user. Threat actors can use this vulnerability to insert malicious PHP code into requests and run arbitrary commands on the underlying server under the WordPress instance’s security context.

After the incident, a new version, 1.3.8, was released that included a patch to address the issue.

It is recommended to update the plugin to the latest version as soon as possible to prevent exploitation of this vulnerability.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...