WordPress cache plugin exploit affects +1 million websites

0

The Popular WordPress Plugin The WP Fastest Cache plugin was discovered by security researchers at Jetpack to have several vulnerabilities that could allow an attacker to assume full administrator privileges. The exploits affect over a million WordPress installations.

Description of the vulnerabilities of the WP Fastest Cache plug-in

WP Fastest Cache is a WordPress plugin used by over a million WordPress websites. The plugin creates a static HTML version of the website.

Several vulnerabilities have been discovered:

  • Authenticated SQL injection
  • XSS stored via cross-site request forgery

Advertising

Continue reading below

Authenticated SQL injection

Authenticated SQL Injection allows logged in users to access administrator level information through the database.

An SQL injection vulnerability is an attack directed against the database, where website elements, including passwords, are stored.

A successful SQL injection attack could lead to a complete takeover of the website.

The Jetpack security bulletin describes the severity of the vulnerability:

“If exploited, the SQL Injection bug could allow attackers to access privileged information in the affected site’s database (for example, hashed usernames and passwords).

It can only be used if the classic-editor plugin is also installed and activated on the site.

Advertising

Continue reading below

XSS stored via cross-site request forgery

Cross-site Scripting (XSS) vulnerabilities are a fairly common vulnerability that results from a flaw in the way website entries are validated. Anywhere a user can enter something on a website, such as a contact form, can be vulnerable to an XSS attack if the entry is not filtered.

Sanitized means to restrict what can be downloaded to a limited expected input, such as text and not scripts or commands. Wrong entry allows an attacker to inject malicious scripts which can then be used to attack users who visit the site, such as the administrator, and do things like download malicious files to their browsers or intercept their information. identification.

Cross Site Request Forgery is when an attacker tricks a user, such as a logged in administrator, to visit the site and perform various actions.

These vulnerabilities depend on the classic editor plugin being installed and whether the attacker has some kind of user authentication, which makes it more difficult to exploit.

But these vulnerabilities are still serious and Jetpack recommends that users upgrade their plugin to at least version 0.95 of WP Fastest Cache.

WP Fastest Cache version 0.95 was released on October 14, 2021.

According to Jetpack:

“If exploited, the SQL Injection bug could allow attackers to access privileged information in the affected site’s database (for example, hashed usernames and passwords).

Successfully exploiting the CSRF & Stored XSS vulnerability could allow malicious actors to perform any action that the logged-in administrator they targeted is allowed to do on the targeted site.

Advertising

Continue reading below

Jetpack Security Research Warning

Jetpack security researchers recommend that all users of the WordPress WP Fastest Cache plugin update their plugin immediately.

Jetpack security researchers posted:

“We recommend that you check which version of the WP Fastest Cache plugin your site is using, and if it’s lower than 0.9.5, update it ASAP!”

Quote

Read the Jetpack security announcement about the WP Fastest Cache plugin

Multiple vulnerabilities in the WP Fastest Cache plugin


Source link

Share.

Leave A Reply