WordPress plugin bug lets attackers inject code into vulnerable sites
A security flaw found in a popular WordPress plugin installed on more than one million websites allows attackers to inject malicious code into vulnerable sites.
Discovered by Wordfence, a provider of web firewalls for WordPress sites, the vulnerability impacts a plugin that integrates the OptinMonster sales, marketing, and newsletter platform inside WordPress websites.
According to a technical report published earlier today, Chamberland blamed the issue on poor coding.
Namely, Chamberland said the plugin had left many of the OptinMonster API endpoints open to commands via the sites where the plugin was installed.
Chamberland said an attacker could query these API endpoints and get details about the site, including their OptinMonster API key.
The attacker could then use this API key to make changes to the site’s OptinMonster marketing and sales campaigns and add their own malicious code to the popups the plugin was showing to site visitors.
Chamberland said the Wordfence team reported the issue to OptinMonster in late September and that the company released a temporary patch a day later, with a full patch delivered on October 7, via the OptinMonster 2.6.5 release.
Additionally, since the company couldn’t tell if the issue had been previously exploited, OptinMonster also invalidated all API keys and forced customers to generate new ones.
Wordfence disclosed the issue today to give the plugin’s more than one million users time to update their sites before mass-exploitation of the issue is most likely to begin.