New Vulnerability in Widespread WordPress Plugin Exposes Over 2 Million Websites to Cyberattacks

[ad_1]

Might 06, 2023Ravie Lakshmanan

Vulnerability

Customers of Superior Customized Fields plugin for WordPress are being urged to replace model 6.1.6 following the invention of a safety flaw.

The problem, assigned the identifier CVE-2023-30777, pertains to a case of mirrored cross-site scripting (XSS) that could possibly be abused to inject arbitrary executable scripts into in any other case benign web sites.

The plugin, which is offered each as a free and professional model, has over two million lively installations. The problem was found and reported to the maintainers on Might 2, 2023.

“This vulnerability permits any unauthenticated person from stealing delicate data to, on this case, privilege escalation on the WordPress website by tricking a privileged person to go to the crafted URL path,” Patchstack researcher Rafie Muhammad stated.

Cybersecurity

Mirrored XSS assaults often happen when victims are tricked into clicking on a bogus hyperlink despatched by way of e mail or one other route, inflicting the malicious code to be despatched to the susceptible web site, which displays the assault again to the person’s browser.

This factor of social engineering signifies that mirrored XSS doesn’t have the identical attain and scale as saved XSS assaults, prompting menace actors to distribute the malicious hyperlink to as many victims as doable.

“[A reflected XSS attack] is often a results of incoming requests not being sufficiently sanitized, which permits for the manipulation of an internet software’s capabilities and the activation of malicious scripts,” Imperva notes.

WordPress Plugin

It is value noting that CVE-2023-30777 might be activated on a default set up or configuration of Superior Customized Fields, though it is solely doable to take action from logged-in customers who’ve entry to the plugin.

The event comes as Craft CMS patched two medium-severity XSS flaws (CVE-2023-30177 and CVE-2023-31144) that could possibly be exploited by a menace actor to serve malicious payloads.

It additionally follows the disclosure of one other XSS flaw within the cPanel product (CVE-2023-29489, CVSS rating: 6.1) that could possibly be exploited with none authentication to run arbitrary JavaScript.

“An attacker cannot solely assault the administration ports of cPanel but additionally the purposes which might be working on port 80 and 443,” Assetnote’s Shubham Shah stated, including it might allow an adversary to hijack a sound person’s cPanel session.

“As soon as appearing on behalf of an authenticated person of cPanel, it’s often trivial to add an internet shell and acquire command execution.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



[ad_2]

Leave a Comment

Your email address will not be published. Required fields are marked *