• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
wordpress plugin alert critical sqli vulnerability threatens 200k+ websites

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

You are here: Home / General Cyber Security News / WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites
February 27, 2024

A critical security flaw has been disclosed in a well known WordPress plugin called Top Member that has more than 200,000 energetic installations.

The vulnerability, tracked as CVE-2024-1071, carries a CVSS rating of 9.8 out of a utmost of 10. Security researcher Christiaan Swiers has been credited with discovering and reporting the flaw.

In an advisory posted past week, WordPress security company Wordfence stated the plugin is “vulnerable to SQL Injection via the ‘sorting’ parameter in versions 2.1.3 to 2.8.2 thanks to insufficient escaping on the person provided parameter and absence of ample preparation on the current SQL question.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As a end result, unauthenticated attackers could consider gain of the flaw to append further SQL queries into now current queries and extract sensitive data from the database.

It is truly worth noting that the issue only influences people who have checked the “Help tailor made desk for usermeta” choice in the plugin options.

Cybersecurity

Following liable disclosure on January 30, 2024, a take care of for the flaw has been produced out there by the plugin builders with the launch of version 2.8.3 on February 19.

Consumers are recommended to update the plugin to the most recent model as quickly as attainable to mitigate opportunity threats, particularly in gentle of the actuality that Wordfence has presently blocked one attack making an attempt to exploit the flaw over the earlier 24 several hours.

In July 2023, yet another shortcoming in the similar plugin (CVE-2023-3460, CVSS score: 9.8) was actively exploited by danger actors to create rogue admin users and seize management of susceptible internet sites.

WordPress

The growth arrives amid a surge in a new marketing campaign that leverages compromised WordPress websites to inject crypto drainers this kind of as Angel Drainer straight or redirect site people to Web3 phishing internet sites that contain drainers.

“These attacks leverage phishing ways and malicious injections to exploit the Web3 ecosystem’s reliance on immediate wallet interactions, presenting a important risk to equally web site homeowners and the basic safety of consumer property,” Sucuri researcher Denis Sinegubko stated.

It also follows the discovery of a new drainer-as-a-provider (DaaS) scheme termed CG (brief for CryptoGrab) that operates a 10,000-member-powerful affiliate method comprised of Russian, English, and Chinese speakers.

Cybersecurity

A single of the threats actor-controlled Telegram channels “refers attackers to a telegram bot that allows them to run their fraud operations with no any third-party dependencies,” Cyfirma said in a report late final thirty day period.

“The bot permits a user to get a area for free, clone an current template for the new area, established the wallet tackle wherever the cheated funds are meant to be sent, and also offers Cloudflare safety for that new domain.”

The menace team has also been observed employing two custom made telegram bots called SiteCloner and CloudflarePage to clone an current, legitimate website and increase Cloudflare safety to it, respectively. These pages are then distributed primarily working with compromised X (previously Twitter) accounts.

Observed this article interesting? Comply with us on Twitter  and LinkedIn to read through more unique content we publish.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «new idat loader attacks using steganography to deploy remcos rat New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
Next Post: New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks new hugging face vulnerability exposes ai models to supply chain»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.