web analytics
NEWS

MORE THAN 90K WORDPRESS SITES ARE VULNERABLE DUE TO A CRITICAL FLAW

1 Mins read
WordPress (Pixabay)

A recently disclosed vulnerability in the ‘Backup Migration’ WordPress plugin has been granted a severity level of 9.8 out of 10. However, things may not be as bad as they appear because a patch is now available.

The security flaw, known as CVE-2023-6553, affects all versions of the plugin up to 1.3.7.

WordPress security site Wordfence, which works closely with the CMS Platform launched a program called “Holiday Bug Extravaganza”

The WordPress plugin Backup Migration, which has more than 90,000 active installations, was found to have a PHP Code Injection vulnerability.

This flaw allows unauthenticated threat actors to inject and execute arbitrary PHP code on WordPress sites that use this plugin.

READ ALSO:  THE EU HAS INTRODUCED A GROUNDBREAKING ACT TO REGULATE ARTIFICIAL INTELLIGENCE

On December 6, 2023, Wordfence swiftly released a firewall rule to safeguard users of Wordfence Premium, Wordfence Care, and Wordfence Response upon discovery.

On the same day, it released its firewall rule, Wordfence approached the BackupBliss team, creators of the Backup Migration plugin. Just hours after giving full disclosure details, the team released a fix.

To be safe, it advises Backup Migration users to upgrade their websites with the most recent patched version of 1.3.8.

WHAT EXACTLY WAS THE VULNERABILITY OF ‘CVE-2023-6553’

The Backup Migration plugin for WordPress is vulnerable to remote code execution in all versions up to 1.3.7 via the “/includes/backup-heart.php” file.

READ ALSO:  APPS THAT REQUIRE ACCESS TO MOST OF ITS USERS' DATA IN THE UK

An attacker can execute remote code by manipulating the values given to an inclusion.

That allows unauthenticated threat actors to execute code on the server with ease.

Vulnerability findings on Backup Migration WordPress Plugin
Vulnerability findings on Backup Migration WordPress Plugin (WordFence)

WordFence added this breach within “Line 118 within the /includes/backup-heart.php file used by the Backup Migration plugin attempts to include bypasser.php from the BMI_INCLUDES directory. The BMI_INCLUDES directory is defined by concatenating BMI_ROOT_DIR with the includes string on line 64. However, note that BMI_ROOT_DIR is defined via the content-dir HTTP header on line 62.”

“This means that BMI_ROOT_DIR is user-controllable. By submitting a specially-crafted request, threat-actors can leverage this issue to include arbitrary, malicious PHP code and execute arbitrary commands on the underlying server in the security context of the WordPress instance.”

READ ALSO:  HACKED U.S. ROBOT VACUUMS SHOUTING RACIAL SLURS AND CHASING PETS

In its concluding summary, WordFence urges Back Migration users to update their plugins. Before it’s too late.

Related posts
NEWS

GOVERNMENT TRIALS NEW AI CHATBOT ON GOV.UK TO ENHANCE PUBLIC SERVICES

1 Mins read
Gov.UK Introduces Government-Sponsored Generative AI Chatbot Trial A new government…
NEWS

WINDOWS 11 PAINT AND NOTEPAD: COPILOT+ EXCLUSIVE AI FEATURES

1 Mins read
After all this time, Notepad and Paint continue to be…
NEWS

JUDGE CLEARS ZUCKERBERG IN SOCIAL MEDIA HARM CASES

2 Mins read
A judge has declared Meta’s CEO, Mark Zuckerberg, free of…