Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Cyberattackers Exploiting Critical WordPress Plugin Bug
#1
Quote:[b]The security hole in the Plus Addons for Elementor plugin was used in active zero-day attacks prior to a patch being issued.[/b]
 


The Plus Addons for Elementor plugin for WordPress has a critical security vulnerability that attackers can exploit to quickly, easily and remotely take over a website. First reported as a zero-day bug, researchers said it’s being actively attacked in the wild.
 
The plugin, which has more than [color=var(--theme-link_a)]30,000 active installations
 according to its developer, allows site owners to create various user-facing widgets for their websites, including user logins and registration forms that can be added to an Elementor page. Elementor is a site-building tool for WordPress.
 
The bug (CVE-2021-24175) is a privilege-escalation and authentication-bypass issue that exists in this registration form function of the Plus Addons for Elementor. It rates 9.8 on the CVSS vulnerability scale, making it critical in severity.
“Unfortunately, this functionality was improperly configured and allowed attackers to register as an administrative user, or to log in as an existing administrative user,” according to researchers at Wordfence, [color=var(--theme-link_a)]in a posting[/color] this week. They added that it arises from broken session management, but didn’t provide further technical details.
Exploited as a Zero-Day Bug
The bug was first [color=var(--theme-link_a)]reported to WPScan[/color] by Seravo, a web-hosting company, as a zero-day under active attack by cybercriminals.
“The plugin is being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin,” according to WPScan’s overview.
 
As for how cybercriminals are using the exploit in the wild, Wordfence noted that indicators of compromise point to attackers creating privileged accounts and then using them to further compromise the site.
“We believe that attackers are adding user accounts with usernames as the registered email address based on how the vulnerability creates user accounts, and in some cases installing a malicious plugin labeled ‘wpstaff,'” researchers said.
 
Worryingly, they added that the vulnerability can still be exploited even if there’s no active login or registration page that was created with the plugin, and even if registration and logins are suspended or disabled.
“This means that any site running this plugin is vulnerable to compromise,” according to the Wordfence posting.
How to Fix the Plus Addons for Elementor Security Vulnerability
The vulnerability was reported on Monday, and fully patched a day later. Site admins should upgrade to version 4.1.7 of The Plus Addons for Elementor to avoid compromise, and they should check for “any unexpected administrative users or plugins you did not install,” according to Wordfence. The Plus Addons for Elementor Lite does not contain the same vulnerability, the firm added.
“If you are using The Plus Addons for Elementor plugin, we strongly recommend that you deactivate and remove the plugin completely until this vulnerability is patched,” researchers said. “If the free version will suffice for your needs, you can switch to that version for the time being.”
WordPress Plugin Problems Persist
WordPress plugins continue to offer an attractive avenue of attack for cybercriminals.
 
In January,[color=var(--theme-link_a)] researchers warned of two vulnerabilities[/color] (one critical) in a WordPress plugin called Orbit Fox that could allow attackers to inject malicious code into vulnerable websites and/or take control of a website.
 
Also that month, a plugin called PopUp Builder, used by WordPress websites for building pop-up ads for newsletter subscriptions, [color=var(--theme-link_a)]was found to have a vulnerability[/color] could be exploited by attackers to send out newsletters with custom content, or to delete or import newsletter subscribers.
 
And in February, an unpatched, stored cross-site scripting (XSS) security bug [color=var(--theme-link_a)]was found to[/color] potentially affect 50,000 Contact Form 7 Style plugin users.
[/color]

Source 
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Microsoft says China-backed hackers are exploiting Exchange zero-days Bjyda 0 1,188 03-03-2021 , 11:39 PM
Last Post: Bjyda
  Kremlin hackers are right now exploiting security hole in VMware software to hijack s mrtrout 2 2,074 12-10-2020 , 07:52 AM
Last Post: divinenews
  Chinese state hackers are exploiting F5, Citrix, Pulse Secure, and Exchange bugs mrtrout 0 1,287 09-14-2020 , 07:32 PM
Last Post: mrtrout
  WordPress Websites Attacked via File Manager Plugin Vulnerability mrtrout 0 961 09-03-2020 , 09:49 PM
Last Post: mrtrout
  WordPress Plugin Bug Allows Malicious Code Injection on 100K Sites sidemoon 0 1,561 03-13-2020 , 10:00 PM
Last Post: sidemoon



Users browsing this thread: 1 Guest(s)