WordPress
WordPress

WordPress plugin bug lets attackers inject code into vulnerable sites

A security flaw found in a popular WordPress plugin installed on more than one million websites allows attackers to inject malicious code into vulnerable sites.

Discovered by Wordfence, a provider of web firewalls for WordPress sites, the vulnerability impacts a plugin that integrates the OptinMonster sales, marketing, and newsletter platform inside WordPress websites.

"These flaws made it possible for an unauthenticated attacker, meaning any site visitor, to export sensitive information and add malicious JavaScript to WordPress sites, among many other actions," said Wordfence security researcher Chloe Chamberland.

According to a technical report published earlier today, Chamberland blamed the issue on poor coding.

Namely, Chamberland said the plugin had left many of the OptinMonster API endpoints open to commands via the sites where the plugin was installed.

Chamberland said an attacker could query these API endpoints and get details about the site, including their OptinMonster API key.

The attacker could then use this API key to make changes to the site's OptinMonster marketing and sales campaigns and add their own malicious code to the popups the plugin was showing to site visitors.

Chamberland said the Wordfence team reported the issue to OptinMonster in late September and that the company released a temporary patch a day later, with a full patch delivered on October 7, via the OptinMonster 2.6.5 release.

Additionally, since the company couldn't tell if the issue had been previously exploited, OptinMonster also invalidated all API keys and forced customers to generate new ones.

Wordfence disclosed the issue today to give the plugin's more than one million users time to update their sites before mass-exploitation of the issue is most likely to begin.

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
No previous article
No new articles

Catalin Cimpanu

Catalin Cimpanu

is a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.