A whole lot of net web sites working WordPress maintain unpatched in opposition to a major security flaw in a extensively used plugin that was being actively exploited in assaults that enable for unauthenticated execution of malicious code, security researchers talked about.
The vulnerability, tracked as CVE-2024-11972is current in Hunk Companiona plugin that runs on 10,000 net pages that use the WordPress content material materials supplies provides administration system. The vulnerability, which carries a severity rating of 9.8 out of a doable 10, was patched earlier this week. On the time this publish went reside on Ars, figures provided on the Hunk Companion net web net web page indicated that decrease than 12 % of shoppers had put contained in the patch, which suggests virtually 9,000 net pages could very efficiently be subsequent to be targeted.
Important, multifaceted hazard
“This vulnerability represents an enormous and multifaceted hazard, concentrating on net pages that use every a ThemeHunk theme and the Hunk Companion plugin,” Daniel Rodriguez, a researcher with WordPress security agency WP Scan, wrote. “With over 10,000 energetic installations, this uncovered 1000’s of web internet sites to anonymous, unauthenticated assaults in a position to severely compromising their integrity.”
Rodriquez talked about WP Scan discovered the vulnerability whereas analyzing the compromise of a purchaser’s website. The company found that the preliminary vector was CVE-2024-11972. The exploit allowed the hackers behind the assault to set off weak net pages to robotically navigate to wordpress.org and buy WP Query Consolea plugin that hasn’t been updated in years.