Thursday, March 28, 2024

Critical Flaws in WordPress Houzez Theme Exploited to Hijack Websites

Houzez is a high-quality WordPress theme that is available for purchase on ThemeForest, a popular marketplace for digital products. This premium theme has been widely recognized for its outstanding features and has garnered an impressive 35,000 sales to date with a price tag of $69.

The Houzez theme and plugin for WordPress, which are commonly utilized by real estate websites, are currently under attack from hackers who are exploiting two high-risk vulnerabilities. 

Vulnerability Details:

These security flaws are considered critical in severity and can potentially cause significant harm to websites and their users.

A threat researcher from Patchstack named Dave Jong has identified two vulnerabilities in the Houzez theme and plugin for WordPress. Upon discovery, the issues were reported to the theme’s vendor, ThemeForest, and were addressed in two separate updates. 

The first vulnerability was fixed in version 2.6.4, which was released in August 2022, and the second issue was resolved in version 2.7.2, which was released in November 2022.

Here below we have mentioned the vulnerabilities:-

  • CVE ID: CVE-2023-26540
  • Description: Houzez Theme Vulnerability
  • CVSS Score: 9.8
  • Severity: Critical
  • CVE ID: CVE-2023-26009
  • Description: Houzez Login Register Vulnerability
  • CVSS Score: 9.8
  • Severity: Critical

A recent report from Patchstack highlights that certain websites have yet to implement the security updates released for the Houzez theme and plugin, leaving them vulnerable to exploitation. This report serves as a warning that hackers are currently targeting these unpatched vulnerabilities in ongoing attacks.

The privilege escalation vulnerability has been found both in the theme itself as well as one of the plugins that are included in the theme. It is important to note that the Houzez Login Register plugin is also vulnerable to the same vulnerability.

Exploitation

At present, the security vulnerability present in the Houzez theme and plugin for WordPress is being actively exploited by cybercriminals. These attacks are being carried out from the IP address 103.167.93.138 and have been observed in significant numbers.

A backdoor was uploaded by the threat actors in the attacks observed by Patchstack that enabled them to perform the following illicit activities:-

  • Executing commands
  • Injecting ads on the website
  • Redirecting traffic to other malicious sites

Patchstack has committed to continuously monitoring any further attempts to exploit the vulnerabilities in the Houzez theme and plugin for WordPress. Apart from this, the website owners and administrators should prioritize the process of applying the available patches with the highest level of priority.

Network Security Checklist – Download Free E-Book

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles