Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities

Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities

May 30, 2024 at 10:21AM

Cybersecurity researchers have warned of high-severity security vulnerabilities in various WordPress plugins, being actively exploited to create rogue administrator accounts for further exploitation. The flaws allow for unauthenticated stored cross-site scripting attacks, enabling threat actors to inject malicious scripts. To mitigate these risks, WordPress site owners should review installed plugins, apply updates, and audit for malware and suspicious administrator users.

Summary of Meeting Notes:

Date: May 30, 2024
Topic: WordPress / Website Security

Key Points:
– Security researchers have identified high-severity security vulnerabilities in various WordPress plugins that are actively exploited by threat actors.
– The vulnerabilities lead to unauthenticated stored cross-site scripting (XSS) attacks, enabling attackers to inject malicious scripts.
– Specific vulnerabilities identified include CVE-2023-6961, CVE-2023-40000, and CVE-2024-2194 with corresponding CVSS scores.
– Attack chains involve injecting a payload to create a new admin account, inserting backdoors, and setting up tracking scripts.
– Fastly detected a significant proportion of exploitation attempts originating from IP addresses associated with AS IP Volume Inc. (AS202425), with the Netherlands being a major source.
– WPScan previously disclosed similar attack efforts targeting CVE-2023-40000.
– Recommendations for site owners include reviewing installed plugins, applying the latest updates, and auditing their sites for signs of malware or suspicious administrator users.

Action Items:
– Site owners should immediately review their installed plugins, apply available updates, and conduct thorough audits of their websites for any signs of compromise.

Please let me know if you need any additional information or analysis on the meeting notes.

Full Article