Home » Security News » The same vulnerability in 3 different WordPress pl...

The same vulnerability in 3 different WordPress plugins put thousands of websites at risk

The same vulnerability in 3 different WordPress plugins put thousands of websites at risk
Deepanker Verma January 17, 2022 Security

Add Techlomedia as a preferred source on Google. Preferred Source

Recently I wrote an article talking about how 2021 was really bad for WordPress. Vulnerabilities in WordPress plugins rose by 142% in 2021 putting millions of websites at risk. It seems 2022 won’t be any different. Now a vulnerability found in three different WordPress plugins has put over 80000 WordPress websites vulnerable.

Wordfence Threat Intelligence team has recently posted an article about the vulnerability they found and reported to plugin developers. The same vulnerability has been found in three different plugins. However, it requires some action from the site administrator to exploit the vulnerability. The three vulnerable plugins are Login/Signup Popup, Side Cart Woocommerce (Ajax), and Waitlist Woocommerce ( Back in stock notifier ) by the same developer called Xootix. All these plugins have a total of 84000 active installs making all the WordPress websites using any of these plugins vulnerable.

The vulnerability exists because all these plugins use the save_settings function via a wp_ajax action without validating the integrity of who was conducting the request. So, an attacker can craft a link request to trigger the AJAX action and execute the function. If the site admin clicks on this crafted link, the link would successfully trigger the action on the website.

This vulnerability is called Cross-Site Request Forgery (CSRF). It is not easy to exploit the vulnerable plugins because it requires administrator interaction, but ut can have a significant impact if successfully exploited.

If you use any of these plugins but also use the Wordfence plugin, your website is protected against any attack trying to exploit this vulnerability. The good thing is that the protection covers both Wordfence Premium and free users.

The company reported these vulnerabilities to developers back on November 5, 2021. Their report was published after plugin developers patched the vulnerabilities. If you use any of these plugins, we recommend you update the plugin to the latest version.

Follow Techlomedia on Google News to stay updated. Follow on Google News

Affiliate Disclosure:

This article may contain affiliate links. We may earn a commission on purchases made through these links at no extra cost to you.

Deepanker Verma

About the Author: Deepanker Verma

Deepanker Verma is the Founder and Editor-in-Chief of TechloMedia. He holds Engineering degree in Computer Science and has over 15 years of experience in the technology sector. Deepanker bridges the gap between complex engineering and consumer electronics. He is also a a known Security Researcher acknowledged by global giants including Apple, Microsoft, and eBay. He uses his technical background to rigorously test gadgets, focusing on performance, security, and long-term value.

Related Posts

Stay Updated with Techlomedia

Join our newsletter to receive the latest tech news, reviews, and guides directly in your inbox.