Home » News » WordPress Attacks: Hackers Exploit Old Plugins

WordPress Attacks: Hackers Exploit Old Plugins

by Sophie Lin - Technology Editor

WordPress Sites Face Relentless Attacks: The Looming Threat of Unpatched Plugins

Over 8.7 million malicious requests were blocked in just 48 hours – a stark warning that the window for addressing known WordPress vulnerabilities is rapidly closing. A widespread exploitation campaign is actively targeting websites running outdated versions of the GutenKit and Hunk Companion plugins, exploiting critical flaws that allow attackers to gain remote code execution (RCE). This isn’t a future threat; it’s happening now, and the sheer volume of attacks signals a potentially escalating crisis for the WordPress ecosystem.

The Vulnerabilities: A Deep Dive

The current wave of attacks centers around three critical vulnerabilities: CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972. **WordPress security** firm Wordfence identified these flaws, which all carry a CVSS score of 9.8 – the highest severity rating. CVE-2024-9234, affecting GutenKit 2.1.0 and earlier, is particularly concerning as it allows attackers to install arbitrary plugins without any authentication. Imagine someone gaining control of your website simply by exploiting this unauthenticated endpoint.

The Hunk Companion plugin (versions 1.8.4 and older, and 1.8.5 and previous) is targeted by CVE-2024-9707 and CVE-2024-11972, both missing-authorization vulnerabilities within the themehunk-import REST endpoint. These flaws also enable the installation of malicious plugins. Attackers aren’t just looking for a quick win; they’re strategically planting the seeds for long-term access and control.

How Attackers Are Exploiting These Flaws

Wordfence’s research reveals a sophisticated attack chain. Once initial access is gained, attackers are deploying a malicious plugin named ‘up’ – distributed via GitHub in a .ZIP archive. This plugin contains obfuscated scripts designed for complete file system control: uploading, downloading, deleting files, and altering permissions. Crucially, one script, disguised as part of the All in One SEO plugin, automates administrator login, effectively handing the keys to the kingdom to the attacker.

Even if a direct admin backdoor isn’t immediately established, attackers are falling back on installing the vulnerable ‘wp-query-console’ plugin, which provides unauthenticated RCE. This demonstrates a clear intent to maintain persistence and exfiltrate sensitive data. The attackers aren’t just after your website; they’re after your data, your users’ information, and potentially, your entire network.

Beyond the Immediate Threat: The Rise of Supply Chain Attacks

This campaign highlights a growing trend in cybersecurity: supply chain attacks. Attackers are increasingly targeting vulnerabilities in plugins and themes – components that many website owners rely on without fully understanding the associated risks. The fact that fixes for these vulnerabilities were released nearly a year ago, yet so many sites remain vulnerable, underscores the challenge of maintaining a secure WordPress environment. It’s not enough to simply install a plugin; ongoing vigilance and proactive updates are essential.

We’re likely to see a continued increase in these types of attacks. As WordPress remains the dominant CMS, it will continue to be a prime target. The ease with which attackers can exploit outdated plugins, combined with the potential for significant impact, makes this a highly attractive avenue for malicious actors. Expect to see more sophisticated payloads and more targeted campaigns in the future.

Identifying a Compromise: What to Look For

Administrators should immediately check their site access logs for suspicious activity. Specifically, look for requests to /wp-json/gutenkit/v1/install-active-plugin and /wp-json/hc/v1/themehunk-import. Additionally, scan your file system for the presence of rogue directories: /up, /background-image-cropper, /ultra-seo-processor-wp, /limitand, and /wp-query-console. Wordfence has also published a list of IP addresses associated with these attacks, which can be used to bolster your firewall defenses. Wordfence’s detailed report provides a comprehensive list of indicators of compromise.

The Path Forward: Proactive Security is Paramount

The most effective defense against these attacks is simple: update your plugins. Ensure you’re running the latest versions of GutenKit (2.1.1 or later) and Hunk Companion (1.9.0 or later). However, a reactive approach isn’t enough. Implement a robust security strategy that includes regular vulnerability scans, strong password policies, and a web application firewall (WAF). Consider using a managed WordPress hosting provider that prioritizes security and provides automatic updates.

The current situation serves as a critical reminder: security isn’t a one-time fix; it’s an ongoing process. Ignoring updates and neglecting proactive security measures is akin to leaving your website’s doors unlocked. What steps will you take today to protect your WordPress site from becoming the next victim?

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Adblock Detected

Please support us by disabling your AdBlocker extension from your browsers for our website.