Rising Malware Campaign Exploits WordPress Plugin Vulnerabilities
In the ever-evolving cyberspace, malfeasance never rests, nor do the efforts to combat it. A recent malware campaign underscores the significance of robust cybersecurity measures. It exploits a severe flaw in the Popup Builder plugin for WordPress, affecting more than 3,900 websites within just three weeks.
Attackers launched this sophisticated scheme from domains registered as early as February 12, 2024. They manipulate CVE-2023-6000 in Popup Builder to form rogue admin accounts and install arbitrary plugins. Alarmingly, the latest onslaught inserts malicious code that sends visitors from legitimate sites to phishing and scam domains.
For WordPress site proprietors, the directive is clear: update plugins, root out suspicious users or code, and undertake a thorough cleanup. A stitch in time saves nine—staying ahead of vulnerabilities by keeping web software updated cannot be overstated.
Another perilous discovery in this digital battlefield includes a flaw in the Ultimate Member plugin, known as CVE-2024-2123. It impacts versions up to 2.8.3 and enables unauthenticated intruders to inject harmful web scripts and potentially commandeer administrative privileges. Thankfully, the team addressed this vulnerability in version 2.8.4, released on March 6, 2024. The discovery followed earlier vulnerabilities in the Avada WordPress theme.
Experts pinpointed that the Popup Builder’s vulnerability serves as a conduit for attackers to steal sensitive data, detailed in a report by PublicWWW. Furthermore, the ordeal encapsulates the campaign’s breadth, from the type of malicious injections to the critical importance of updates in website security, as highlighted by security analyst Puja Srivastava.
Even area-specific security advisories, like the one from Sucuri, emphasize the new malware’s tactics employing stored XSS vulnerability in Popup Builder and the essential cleanup steps. Similarly, revelation through Wordfence’s research grants deeper insight into vulnerabilities and the proactive strategies organizations can take. Wordfence’s Bug Bounty Program contribution was notable, as seen in their detailed account concerning the Ultimate Member plugin’s stored Cross-Site Scripting vulnerability, injected through templates lacking secure input sanitation.
These compounding security lapses offer a stark reminder: vigilance is paramount. As noted by Wordfence and echoed throughout the cybersecurity community, immediate updates post-discovery of such weaknesses are vital to shield against exploitation. It’s a testament to the tireless endeavors of security teams and researchers. Their dedication to exposing these flaws not only reinforces defenses but also provides the broader community with invaluable intelligence.
If you enjoyed this article, please check out our other articles on CyberNow