Sunday, July 12, 21:46
Home security An error in a WordPress plugin puts 100.000 sites at risk

An error in a WordPress plugin puts 100.000 sites at risk

additional

A new error one-click, which was discovered in the add-on Real-time Find and Replace, allows hackers enter malicious code into sites and create fake administrator accounts. Website owners WordPress it is recommended that they notify the add-on immediately, so that they remain secure.

The error, which is one Cross-Site Request Forgery (CSRF), can lead to attacks Stored Cross-Site Scripting (Stored XSS). It affects all versions of Real-Time Find and Replace, up to 3.9.

Malicious agents can deceive a legitimate website owner into importing malware JavaScript on his account by simply clicking on a link he will find in a misleading e-mail or comment.

The WordPress Real-Time Find and Replace plugin is especially useful, as it allows a user to temporarily replace a text or code in real time without having to enter the source code of the site and make permanent changes. This add-on is installed on more than 100.000 websites.

Malicious code imports

As reported in exhibition Chloe Chamberland, an analyst at Wordfence, one hacker it can take advantage of the capabilities of the add-on to insert malicious code into a site and change its content.

This JavaScript code will be executed automatically "whenever a user navigates to a website that contained the original content", according to Chamberland.

For example, invaders could abuse it vulnerability to replace an HTML tag like <head> with their malicious code. As a result, almost all pages on the WordPress site that have been infected become malicious.

Malicious code could then be “used to enter a new administrator account, steal cookies or redirect users to a malicious site, allowing intruders to gain access to an administrator or infect innocent visitors browsing a breach. website ”, according to the Chamberland report.

Η vulnerability was discovered and reported on April 22. Wordfence rated this security flaw with CVSS 8,8, which makes it very serious, and it's imperative that users update to version 4.0.2, which completely fixes the bug.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

TrickBot malware accidentally warns victims that they have been infected

The famous TrickBot malware accidentally left a test module that warns the victims that they are infected and should contact ...

Financial institutions: The risk of data breach is higher!

According to a report, financial institutions tend to be at greater risk of data breach due to a lack of proper security controls ....

Google Chrome: Import, export and backup stored passwords

Google Chrome Password Manager lets you save usernames and passwords and ...

Apple: do not cover the camera on MacBook devices

Many users today have a habit of covering their laptop camera in order to protect themselves from any surveillance through it. However...

COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.