Begin typing your search above and press return to search.
proflie-avatar
Login
exit_to_app
Can Trump wield his big stick?
access_time 22 Nov 2024 10:39 AM GMT
election commmission
access_time 22 Nov 2024 4:02 AM GMT
Champions Trophy tournament
access_time 21 Nov 2024 5:00 AM GMT
The illness in health care
access_time 20 Nov 2024 5:00 AM GMT
The fire in Manipur should be put out
access_time 21 Nov 2024 9:19 AM GMT
America should also be isolated
access_time 18 Nov 2024 11:57 AM GMT
DEEP READ
Munambam Waqf issue decoded
access_time 16 Nov 2024 5:18 PM GMT
Ukraine
access_time 16 Aug 2023 5:46 AM GMT
Foreign espionage in the UK
access_time 22 Oct 2024 8:38 AM GMT
exit_to_app
Homechevron_rightTechnologychevron_rightCritical unpatched bug...

Critical unpatched bug puts over 2 Lakh WordPress websites at hacking risk

text_fields
bookmark_border
Critical unpatched bug puts over 2 Lakh WordPress websites at hacking risk
cancel

New Delhi: More than 2 lakh WordPress websites are at hacking risk due to a critical unpatched security vulnerability that was being actively exploited by malicious actors.

According to WordPress security firm WPScan, the bug is present in the Ultimate Member plugin, which is a free user profile WordPress plugin that makes it easy to create powerful online communities and membership sites with WordPress.

"This is a very serious issue as unauthenticated attackers may exploit this vulnerability to create new user accounts with administrative privileges, giving them the power to take complete control of affected sites," the security firm warned.

There was "no complete fix to this issue" and worryingly, "there were indications that this issue was being actively exploited by malicious actors," the firm added.

In response to the vulnerability report, the creators of the plugin promptly released a new version, 2.6.4, intending to fix the problem.

"However, upon investigating this update, we found numerous methods to circumvent the proposed patch, implying the issue is still fully exploitable," the WPScan team noted.

The plugin operates by using a pre-defined list of user metadata keys that users should not manipulate.

It uses this list to check if users are attempting to register these keys when creating an account.

"Unfortunately, differences in how the Ultimate Member’s blocklist logic and how WordPress treats metadata keys made it possible for attackers to trick the plugin into updating some it shouldn’t," said the team.

The security researchers recommend that the users should disable the Ultimate Member plugin until a patch that completely remediates this security issue is made available.

Sites on WP.cloud hosts, such as WordPress.com and Pressable.com, have received a platform-level patch to help mitigate the vulnerability.

With inputs from agencies

Also Read:WhatsApp rolling out new secure chat transfer feature


Show Full Article
TAGS:HackingWordPress
Next Story