Critical Flaw in WP Automatic WordPress Plugin Allows Admin Account Hijacking

by | Apr 26, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A critical vulnerability in the WP Automatic plugin for WordPress has become a target for threat actors, allowing them to create user accounts with administrative privileges and implant backdoors for sustained access.

Installed on over 30,000 websites, WP Automatic enables administrators to automate content importing from various online sources, including text, images, and video, for publishing on their WordPress site.

Dubbed CVE-2024-27956, the vulnerability has garnered a severity score of 9.9/10. Disclosed by researchers at PatchStack vulnerability mitigation service on March 13, it is described as an SQL injection issue affecting WP Automatic versions prior to 3.9.2.0.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

The vulnerability lies in the plugin’s user authentication mechanism, permitting attackers to bypass it and submit SQL queries to the site’s database. Crafted queries enable hackers to establish administrator accounts on the target website.

WPScan, from Automattic, has reported over 5.5 million attack attempts since PatchStack disclosed the issue, with the majority occurring on March 31st. Upon gaining admin access, attackers create backdoors and obfuscate code to evade detection.

“After compromising a WordPress site, attackers ensure continued access by creating backdoors and obfuscating code,” states WPScan’s report.




Threat actors rename the vulnerable file “csv.php” to deter other attackers and detection. Once control is established, they often install additional plugins for file uploads and code editing.

To identify potential compromises, administrators should watch for admin accounts beginning with “xtw” and files named web.php and index.php, which are backdoors from recent attacks.

To mitigate risk, researchers advise WordPress site administrators to update the WP Automatic plugin to version 3.92.1 or later. Additionally, regular backups can expedite recovery in case of compromise.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This