Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
WordPress Plugin Compromised Detected (AL02/240625/CSIRT-ITA)

WordPress Plugin Compromised Detected (AL02/240625/CSIRT-ITA)

Summary

A compromise of some WordPress plugins has recently been detected, used by attackers to inject malicious code and exfiltrate sensitive information.

Risk

Estimate of the impact of the vulnerability on the reference community: HIGH/ORANGE (73.07/100)1.

Type

  • Remote Code Execution
  • Information Leakage
  • Privilege Escalation

Description and potential impacts

The Wordfence Threat Intelligence team has recently detected the compromise of some WordPress plugins, within which malicious PHP code has been identified.

In detail, this code would be able to perform the following activities on the impacted instances:

  • exfiltrate the user credentials database;
  • create administrative users;
  • communicate with the C2 server under the control of the attackers;
  • insert JavaScript code into the footer of the web pages of the platforms concerned, in order to gain visibility in search engines through the “SEO spam” technique (spamdexing).

For any further information, we recommend consulting the link to the Wordfence security bulletin, present in the References section.

Affected products and versions

The infected plugins detected by security researchers are reported as of now:

  • Social Warfare, from version 4.4.6.4 to 4.4.7.1
  • Blaze Widget, from version 2.2.5 to 2.5.2
  • Wrapper Link Element, versions 1.0.2 and 1.0.3
  • Contact Form 7 Multi-Step Addon, versions 1.0.4 and 1.0.5
  • Simply Show Hooks, version 1.2.1

Mitigation actions

In line with the statements of security researchers, while waiting for the release of new versions of the plugins, we recommend the timely removal of malicious versions and monitoring the developers’ repositories of the aforementioned plugins.

Finally, we recommend evaluating the verification and implementation – on your security devices – of the Indicators of Compromise (IoC)2 present in the Wordfence security bulletin.

Unique Vulnerability Identifiers

CVE-2024-6297

References

https://www.wordfence.com/threat-intel/vulnerabilities/detail/several-wordpressorg-plugins-various-versions-injected-backdoor

https://wordpress.org/support/topic/a-security-message-from-the-plugin-review-team

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of affected software/devices in the reference community.

2By definition, not all indicators of compromise are malicious. This CSIRT has no responsibility for implementing any proactive actions (e.g. blocklisting IoCs) related to the indicators provided. The information contained in this document represents the best understanding of the threat at the time of release.

Recommended to you

Search in 365TRUST

Our services