{"id":6061,"date":"2023-12-08T04:44:49","date_gmt":"2023-12-08T04:44:49","guid":{"rendered":"https:\/\/www.bulwarkers.com\/blogs\/?p=6061"},"modified":"2023-12-08T04:44:51","modified_gmt":"2023-12-08T04:44:51","slug":"the-wordpress-plugin-exposes-half-a-million-sites-to-attack","status":"publish","type":"post","link":"https:\/\/www.bulwarkers.com\/blogs\/the-wordpress-plugin-exposes-half-a-million-sites-to-attack\/","title":{"rendered":"The WordPress plugin exposes half a million sites to attack"},"content":{"rendered":"\n<p>A popular\u00a0WordPress plugin used by more than a million websites all over the world is carrying a critical remote code execution (RCE) flaw that allowed potential malicious actors to perform a local file inclusion attack.<\/p>\n\n\n\n<p>Cybersecurity researcher Wai Yan Muo Thet discovered the vulnerability in the Essential Addons for Elementor plugin on January 25, 2022, and reported it to Patchstack the same day.\u00a0<\/p>\n\n\n\n<p>WPDeveloper, the owner of the\u00a0plugin\u00a0in question, was already aware of the vulnerability and has already made two unsuccessful attempts to fix the issue.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Fixing the Issue<\/strong><\/h2>\n\n\n\n<p>\u201cThe native file inclusion vulnerability exists because of the manner person enter knowledge is used within PHP\u2019s embrace operate which might be a part of the ajax_load_more and ajax_eael_product_gallery features,\u201d PatchStack defined.&nbsp;<\/p>\n\n\n\n<p>The one factor the susceptible website wants is to have the \u201cdynamic gallery\u201d and \u201cproduct gallery\u201d widgets enabled, it added.<\/p>\n\n\n\n<p>Variations 5.0.3 and 5.0.4 each tried to deal with the issue, which was lastly solved in model 5.0.5. For the time being, some 400,000 websites have upgraded the plugin, which means roughly 600,000 are nonetheless susceptible.\u00a0<\/p>\n\n\n\n<p>These working Important Addons for Elementor have two methods to go about fixing the difficulty: downloading the most recent model from this hyperlink, or heading over to the WordPress dashboard and triggering the replacement straight from there.\u00a0<\/p>\n\n\n\n<p>WordPress plugins have proved to style targets for hackers attacking main vulnerabilities in current months. In November 2021, researchers discovered a website takeover flaw within the Preview E-mails for WooCommerce addon, whereas in December 2021, a vulnerability within the in-style WPS Disguise Login plugin might have allowed attackers entry to a website\u2019s administrator login web page.<\/p>\n\n\n\n<p>The excellent news is that the plugins\u2019 house owners are often fast to react when the vulnerabilities are disclosed. Site owners working\u00a0WordPress sites\u00a0are suggested to maintain all of their addons up to date always, to keep the chance of an assault right down to a minimal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A popular\u00a0WordPress plugin used by more than a million websites all over the world is carrying a critical remote code execution (RCE) flaw that allowed potential malicious actors to perform a local file inclusion attack. Cybersecurity researcher Wai Yan Muo Thet discovered the vulnerability in the Essential Addons for Elementor plugin on January 25, 2022, and reported it to Patchstack the same day.\u00a0 WPDeveloper, the owner of the\u00a0plugin\u00a0in question, was already aware of the vulnerability and has already made two unsuccessful attempts to fix the issue. Fixing the Issue \u201cThe native file inclusion vulnerability exists because of the manner person enter knowledge is used within PHP\u2019s embrace operate which might be a part of the ajax_load_more and ajax_eael_product_gallery features,\u201d PatchStack defined.&nbsp; The one factor the susceptible website wants is to have the \u201cdynamic gallery\u201d and \u201cproduct gallery\u201d widgets enabled, it added. Variations 5.0.3 and 5.0.4 each tried to deal with the issue, which was lastly solved in model 5.0.5. For the time being, some 400,000 websites have upgraded the plugin, which means roughly 600,000 are nonetheless susceptible.\u00a0 These working Important Addons for Elementor have two methods to go about fixing the difficulty: downloading the most recent model from this hyperlink, or heading over to the WordPress dashboard and triggering the replacement straight from there.\u00a0 WordPress plugins have proved to style targets for hackers attacking main vulnerabilities in current months. In November 2021, researchers discovered a website takeover flaw within the Preview E-mails for WooCommerce addon, whereas in December 2021, a vulnerability within the in-style WPS Disguise Login plugin might have allowed attackers entry to a website\u2019s administrator login web page. The excellent news is that the plugins\u2019 house owners are often fast to react when the vulnerabilities are disclosed. Site owners working\u00a0WordPress sites\u00a0are suggested to maintain all of their addons up to date always, to keep the chance of an assault right down to a minimal.<\/p>\n","protected":false},"author":1,"featured_media":6062,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[71],"tags":[],"class_list":["post-6061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","pmpro-has-access"],"views":5656,"_links":{"self":[{"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/posts\/6061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/comments?post=6061"}],"version-history":[{"count":1,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/posts\/6061\/revisions"}],"predecessor-version":[{"id":6063,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/posts\/6061\/revisions\/6063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/media\/6062"}],"wp:attachment":[{"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/media?parent=6061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/categories?post=6061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bulwarkers.com\/blogs\/wp-json\/wp\/v2\/tags?post=6061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}