CVE-2024-6297

Several WordPress.org Plugins <= Various Versions - Injected Backdoor

criticalEmbedded Malicious Code
10.0
CVSS Score
10.0
CVSS Score
critical
Severity
1.7.8
Patched in
107d
Time to patch

Description

Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. All plugins have received updates reverting any added malicious code. Simply Show Hooks affected version (1.2.1) is the same as the patched version (1.2.1) - it does not appear that the malicious copy was ever officially released, so sites running 1.2.1 should be unaffected, though it is a good idea to run a complete Wordfence scan and verify that there are no rogue administrator accounts present.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
High
Confidentiality
High
Integrity
High
Availability

Technical Details

Affected versions>=1.7.6 <=1.7.6
PublishedJune 24, 2024
Last updatedOctober 8, 2024
Affected pluginwp-server-stats

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.