• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Critical Zero-Day in WordPress Plugin Under Active Attack

You are here: Home / General Cyber Security News / Critical Zero-Day in WordPress Plugin Under Active Attack
June 2, 2021

Security researchers have warned of a critical new zero-day vulnerability in a WordPress plugin actively exploited in the wild.

The Fancy Solution Designer plugin is mounted on in excess of 17,000 internet sites, allowing for customers to upload photos and PDF files to solutions, in accordance to gurus at security vendor Wordfence.

“We initiated make contact with with the plugin’s developer the exact same working day and gained a reaction in just 24 hours. We sent in excess of the full disclosure the exact working day we received a response, on June 01 2021,” explained threat analyst Ram Gall.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Due to this vulnerability becoming actively attacked, we are publicly disclosing with nominal particulars even though it has not still been patched in get to alert the local community to get precautions to preserve their sites protected.”

The file upload vulnerability has a Widespread Vulnerability Scoring Process (CVSS) rating of 9.8. Despite the fact that the Fancy Item Designer plugin has some checks to block malicious file uploads, attackers can very easily bypass the checks. In concept, an attacker could upload executable PHP information to any website with the plugin put in, Gall warned.

“This efficiently will make it attainable for any attacker to reach Distant Code Execution on an impacted web site, enabling complete site takeover,” he additional.

Wordfence issued a new rule to its paid out firewall item on Monday, with subsequent updates to its totally free edition on June 30 to protect consumers from the attacks.

Even so, buyers ended up urged to uninstall the plugin for the time getting.

“As this is a critical zero-day underneath active attack and is exploitable in some configurations even if the plugin has been deactivated, we urge any one applying this plugin to fully uninstall Extravagant Item Designer, if attainable, until eventually a patched version is available,” concluded Gall.


Some elements of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «hackers‌ ‌actively‌ ‌exploiting‌ ‌0 day‌ ‌in wordpress plugin installed on over Hackers‌ ‌Actively‌ ‌Exploiting‌ ‌0-Day‌ ‌in WordPress Plugin Installed on Over ‌17,000‌ ‌Sites
Next Post: The Incident Response Plan – Preparing for a Rainy Day the incident response plan preparing for a rainy day»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.