0
Your Cart
No products in the cart.

UPDATED 21:01 EDT / APRIL 14 2022
by Duncan Riley
A critical vulnerability in a highly popular WordPress plugin has exposed millions of websites to hacking.
Discovered by researchers at Plugin Vulnerabilities and detailed April 12, the vulnerability was found in Elementor, a WordPress plugin that allows users to build websites with more than 5 million active installations. The vulnerability was found in version 3.6.0 of the plugin, introduced on March 22, with about a third of the sites using Elemantor to run the vulnerable version when the vulnerability was found.
The vulnerability is caused by an absence of a critical access check in one of the plugin’s files, which is loaded on every request, even if users are not logged in. Because the check does not occur, access to the file and hence the plugin is open to all and sundry, including bad actors.
Exploiting the vulnerability opens the door for anyone to make changes to the site, including uploading arbitrary files. As a result, hackers could exploit the vulnerability for remote code execution and takeover of a site running the plugin. “Based on just what we saw in our very limited checking, we would recommend not using this plugin until it has had a thorough security review and all issues are addressed,” the researchers noted.
The vulnerability has since been addressed in the latest update to Elementor version 3.6.3. Naturally, anyone running a WordPress install with Elementor  3.6.0 to 3.6.2 is encouraged to update to the latest version to address the critical vulnerability.
“WordPress powers as much as a third of all websites on the Internet, including some of the most highly trafficked sites and a large percentage of e-commerce sites, so why aren’t they better equipped to protect against attack?”  Pravin Madhani, co-founder and chief executive of application security platform provider K2 Cyber Security Inc., told SiliconANGLE. “In particular, RCE is one of the most dangerous flaws because it gives the attacker the ability to run almost any code on the hacked site.”
Madhani explained that traditional application security tools like Web Application Firewalls have difficulty in dealing with RCE attacks because they rely on understanding a past RCE attack or signature in order to detect a new zero-day or undiscovered attack.
“For maximum protection, organizations using WordPress should make sure they use security in-depth, including application, network and system-level security,” Madhani added. “Finally, the simplest thing any organization can do to help reduce vulnerabilities is to keep their code — WordPress, plugins, SQL server-MySQL/MariaDB, web server-NGINX/Apache — up to date and patched.”
THANK YOU
Flexport confirms second round of layoffs, with 20% of its staff to go
New repository aims to illuminate open-source package vulnerabilities and malicious code
Mojo Vision raises $21.1M for its micro-LED display technology
The Hamas-Israeli war is also being fought in cyberspace
Google adds image and text generation features to its SGE search service
Lakera and Deasie raise funding to make AI large language models more reliable
Flexport confirms second round of layoffs, with 20% of its staff to go
CLOUD - BY MIKE WHEATLEY . 43 MINS AGO
New repository aims to illuminate open-source package vulnerabilities and malicious code
SECURITY - BY DUNCAN RILEY . 47 MINS AGO
Mojo Vision raises $21.1M for its micro-LED display technology
EMERGING TECH - BY MARIA DEUTSCHER . 3 HOURS AGO
The Hamas-Israeli war is also being fought in cyberspace
SECURITY - BY DAVID STROM . 4 HOURS AGO
Google adds image and text generation features to its SGE search service
AI - BY MARIA DEUTSCHER . 4 HOURS AGO
Lakera and Deasie raise funding to make AI large language models more reliable
AI - BY MARIA DEUTSCHER . 6 HOURS AGO
Forgot Password?
Like Free Content? Subscribe to follow.

source