• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
over 280,000 wordpress sites attacked using wpgateway plugin zero day vulnerability

Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability

You are here: Home / General Cyber Security News / Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability
September 14, 2022

A zero-working day flaw in the latest model of a WordPress premium plugin recognized as WPGateway is staying actively exploited in the wild, perhaps allowing malicious actors to entirely take about affected internet sites.

Tracked as CVE-2022-3180 (CVSS score: 9.8), the issue is becoming weaponized to add a malicious administrator user to internet sites managing the WPGateway plugin, WordPress security firm Wordfence famous.

“Portion of the plugin functionality exposes a vulnerability that makes it possible for unauthenticated attackers to insert a malicious administrator,” Wordfence researcher Ram Gall said in an advisory.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

WPGateway is billed as a usually means for web site directors to set up, backup, and clone WordPress plugins and themes from a unified dashboard.

The most popular indicator that a web-site operating the plugin has been compromised is the presence of an administrator with the username “rangex.”

On top of that, the physical appearance of requests to “//wp-content material/plugins/wpgateway/wpgateway-webservice-new.php?wp_new_credentials=1” in the obtain logs is a indicator that the WordPress web-site has been specific applying the flaw, although it won’t always imply a effective breach.

Wordfence stated it blocked in excess of 4.6 million attacks making an attempt to choose gain of the vulnerability from a lot more than 280,000 web pages in the previous 30 days.

Even further aspects about the vulnerability have been withheld owing to lively exploitation and to stop other actors from using edge of the shortcoming. In the absence of a patch, people are recommended to eliminate the plugin from their WordPress installations until a deal with is readily available.

CyberSecurity

The enhancement arrives times immediately after Wordfence warned of in-the-wild abuse of an additional zero-day flaw in a WordPress plugin known as BackupBuddy.

The disclosure also comes as Sansec discovered that danger actors broke into the extension license program of FishPig, a seller of well-liked Magento-WordPress integrations, to inject destructive code that’s designed to set up a remote obtain trojan called Rekoobe.

Uncovered this post fascinating? Observe THN on Facebook, Twitter  and LinkedIn to browse extra exclusive content material we write-up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News ShadowPad-Associated Hackers Targeted Asian Governments
Next Post: Microsoft’s Latest Security Update Fixes 64 New Flaws, Including a Zero-Day microsoft's latest security update fixes 64 new flaws, including a»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.