SELL FASTER BUY SMARTER SEARCH SHOP ADVERTS


SCROll DOWN TO SEE FORM TO POST ..SCROll DOWN TO SEE FORM TO POST
++MAP OR ENTER BELOW

Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!

Apr 01, 2023Ravie LakshmananWeb Security / Cyber Threat

WordPress Elementor Pro Vulnerability

Unknown threat actors are actively exploiting a recently patched
security vulnerability in the Elementor Pro website builder plugin
for WordPress.

The flaw, described as a case of broken access control, impacts
versions 3.11.6 and earlier. It was addressed by the plugin
maintainers in version 3.11.7 released on March 22.

“Improved code security enforcement in WooCommerce components,”
the Elementor said[1]
in its release notes. The premium plugin is estimated[2] to be used on over 12
million sites.

Successful exploitation of the high-severity flaw allows an
authenticated attacker to complete a takeover of a WordPress site
that has WooCommerce enabled.

“This makes it possible for a malicious user to turn on the
registration page (if disabled) and set the default user role to
administrator so they can create an account that instantly has the
administrator privileges,” Patchstack said[3]
in an alert of March 30, 2023.

“After this, they are likely to either redirect the site to
another malicious domain or upload a malicious plugin or backdoor
to further exploit the site.”

WordPress Elementor Pro Vulnerability

Credited with discovering and reporting the
vulnerability
[4]
on March 18, 2023, is NinTechNet security researcher Jerome
Bruandet.

Patchstack further noted that the flaw is currently being abused
in the wild from several IP addresses intending to upload arbitrary
PHP and ZIP archive files.

Users of the Elementor Pro plugin are recommended to update to
3.11.7 or 3.12.0, which is the latest version, as soon as possible
to mitigate potential threats.

THN WEBINAR

Become an Incident Response Pro!

Unlock the secrets to bulletproof incident response – Master the
6-Phase process with Asaf Perlman, Cynet’s IR Leader!

Don’t Miss Out –
Save Your Seat!
[5]

The advisory comes over a year after the Essential Addons for Elementor
plugin
[6] was found to contain a
critical vulnerability that could result in the execution of
arbitrary code on compromised websites.

Last week, WordPress issued auto-updates to remediate another
critical bug in the WooCommerce Payments plugin[7] that allowed
unauthenticated attackers to gain administrator access to
vulnerable sites.

Found this article interesting? Follow us on Twitter [8]
and LinkedIn[9]
to read more exclusive content we post.

References

  1. ^
    said
    (elementor.com)
  2. ^
    estimated
    (elementor.com)
  3. ^
    said
    (patchstack.com)
  4. ^
    discovering and reporting the
    vulnerability
    (blog.nintechnet.com)
  5. ^
    Don’t Miss Out – Save Your Seat!
    (thn.news)
  6. ^
    Essential Addons for Elementor
    plugin
    (thehackernews.com)
  7. ^
    WooCommerce Payments plugin
    (thehackernews.com)
  8. ^
    Twitter
    (twitter.com)
  9. ^
    LinkedIn
    (www.linkedin.com)

Read more

.An African People Search Engine Business directory and Entertainment Portal . Powered by The Swordpress Blog and the folks @ ojoojoo.com and Dotifi Web hosting

Submit A Place
Help Us Review This SwordPress !
Get Mobile App Get Mobile App
Get Mobile App

Add a new location

Edit Location

Add up to 5 images to create a gallery for this location.

×