Critical Plugin Vulnerabilities in WordPress

, WordPress Plugins Vulnerability

WordPress administrators face a fresh wave of cybersecurity concerns as two widely used plugins developed by miniOrange have been identified as critically flawed. After a careful investigation, WordPress discovered a severe security flaw in the Malware Scanner and Web Application Firewall plugins, compelling users to eliminate these tools from their websites immediately.

Furthermore, during a recent Bug Bounty Extravaganza, researchers unmasked a Privilege Escalation vulnerability in these miniOrange plugins. This vulnerability permitted unauthenticated attackers to usurp administrative privileges, impacting versions up to 4.7.2 for Malware Scanner and 2.1.1 for Web Application Firewall. Stiofan, the conscientious researcher who brought this issue to light, received a $1,250 bounty for the discovery. Wordfence users, fortunately, were given protection rules on March 4, 2024, just days before the plugins saw their demise.

These plugins’ maintainers permanently closed their functions on March 7th with no patches available, according to Wordfence. At the heart of the issue lies a missing capability check within the function ‘mo_wpns_init()’, which paves the way for an alarming and unfettered privilege escalation. With malware scanner boasting over 10,000 active installations and the Web Application Firewall attracting more than 300, thousands of sites faced potential compromises, as attackers could easily modify user passwords and grant themselves admin rights.

In a similar vein, another plugin — RegistrationMagic — also fell victim to a privilege escalation flaw. Responding to the crisis, Wordfence awarded a $1,313 bounty to researcher Krzysztof Zając for identifying this separate yet parallel CVE-2024-1991 vulnerability, which allowed authenticated attackers to boost their user status to administrator level.

Continuous collaboration between Wordfence and security researchers like Zając played a pivotal role in securing the WordPress ecosystem. Upon confirmation of the vulnerability, Wordfence quickly implemented protection measures and worked with the plugin vendor to release a vital patch. RegistrationMagic users were urged to update to version 5.3.1.0 to nullify the risk posed by the flaw. Premium Wordfence users received a defensive firewall rule on February 28, 2024, and the broader community of free users attained the same protection a month later.

In the wake of these vulnerabilities, WordPress site administrators must act swiftly to maintain security. The significance of applying timely updates has never been clearer, as these act as the first line of defense against potential site exploits. For those using the afflicted plugins, removing them remains the only course of action to prevent unauthorized privilege escalations and the dire consequences that could ensue.

Thus, it stands as an unquestionable imperative: in the realm of cybersecurity, vigilance is the guardian of the digital fortitude. WordPress admins now find themselves reminded of the ever-present need to scrutinize the tools that underpin their sites’ functionality and to adhere to the best practices prescribed by leading cybersecurity firms, such as immediately deleting the compromised miniOrange plugins as detailed by Wordfence.

If you enjoyed this article, please check out our other articles on CyberNow

March 18, 2024
Multiple critical vulnerabilities in WordPress plugins by miniOrange have prompted urgent security updates and plugin removals.