• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Critical Security Flaw In Wordpress Plugin Lets Rce

5M WordPress Sites Running the Contact Form 7 Plugin are Open to Attack

You are here: Home / Latest Cyber Security Vulnerabilities / 5M WordPress Sites Running the Contact Form 7 Plugin are Open to Attack

A critical unrestricted file upload bug in Contact Form 7 will allow an unauthenticated visitor to just take more than a web-site functioning the plugin.

A patch for the common WordPress plugin named Make contact with Kind 7 was introduced Thursday and fixes a critical bug that permits an unauthenticated adversary to takeover a internet site managing the plugin or maybe hijack the total server hosting the web site. The patch arrives in the sort of a 5.3.2 variation update to the Make contact with Variety 7 plugin.

The WordPress utility is active on 5 million websites with a the vast majority of people internet sites (70 %) working model 5.3.1 or older of the Call Variety 7 plugin.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The critical vulnerability (CVE-2020-35489) is categorized as an unrestricted file upload bug, according to the Astra Security Exploration that identified the flaw on Wednesday.

Speedy Deal with

“The plugin developer (Takayuki Miyoshi) was speedy to take care of the vulnerability realizing its critical nature. We communicated back and forth trying to release the update as shortly as attainable to avert any exploitation. An update correcting the issue has now been introduced, in edition 5.3.2,” in accordance to Astra.The bug hunter credited for pinpointing the flaw, Jinson Varghese, wrote the vulnerability makes it possible for an unauthenticated person to bypass any kind file-form restrictions in Get hold of Sort 7 and add an executable binary to a site working the plugin model 5.3.1 or earlier.

Following, the adversary can do a variety of malicious factors such as deface the web site or redirect readers to a third-party web site in try to con guests into handing more than fiscal and particular details.

In addition to getting more than the qualified web page, an attacker could also commandeer the server hosting the web page if there is no containerization applied to segregate the internet site on the server hosting the WordPress instance, according to scientists.

Quick to Exploit

“It is easily exploitable. And the attacker would not need to be authenticated and the attack can be done remotely,” reported Naman Rastogi, electronic marketer and advancement hacker with Atra in an email interview with Threatpost.

He reported a Call Variety 7 update has been pushed. “For buyers who have computerized updates on for WordPress plugin the computer software will mechanically update. For many others, they indeed will have to have to proactively update,” he told Threatpost.

To continue to keep standpoint on the bug, web analytics organization Netcraft estimates there are 455 million web sites applying the WordPress system ideal now. That suggests 1.09 percent of WordPress sites could be susceptible to attack by way of this flaw.

Download our unique Totally free Threatpost Insider E book Healthcare Security Woes Balloon in a Covid-Period World , sponsored by ZeroNorth, to find out far more about what these security threats suggest for hospitals at the day-to-working day level and how health care security groups can put into practice ideal methods to protect companies and clients. Get the complete story and Download the Ebook now – on us!


Some pieces of this post are sourced from:
threatpost.com

Previous Post: «New Isac For K 12 School Districts Fills A Key Cyber New ISAC for K-12 school districts fills a key cyber intelligence gap
Next Post: Nuclear Weapons Agency Hacked in Widening Cyberattack – Report Nuclear Weapons Agency Hacked In Widening Cyberattack – Report»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.