A whole lot of internet sites working WordPress keep unpatched in opposition to a vital security flaw in a extensively used plugin that was being actively exploited in assaults that let for unauthenticated execution of malicious code, security researchers talked about.
The vulnerability, tracked as CVE-2024-11972is current in Hunk Companiona plugin that runs on 10,000 web sites that use the WordPress content material materials administration system. The vulnerability, which carries a severity rating of 9.8 out of a possible 10, was patched earlier this week. On the time this publish went reside on Ars, figures provided on the Hunk Companion net web page indicated that decrease than 12 % of shoppers had put within the patch, which suggests nearly 9,000 web sites could very effectively be subsequent to be targeted.
Very important, multifaceted danger
“This vulnerability represents a significant and multifaceted danger, concentrating on web sites that use every a ThemeHunk theme and the Hunk Companion plugin,” Daniel Rodriguez, a researcher with WordPress security company WP Scan, wrote. “With over 10,000 energetic installations, this uncovered 1000’s of web websites to anonymous, unauthenticated assaults capable of severely compromising their integrity.”
Rodriquez talked about WP Scan discovered the vulnerability whereas analyzing the compromise of a purchaser’s web site. The company found that the preliminary vector was CVE-2024-11972. The exploit allowed the hackers behind the assault to set off weak web sites to robotically navigate to wordpress.org and acquire WP Query Consolea plugin that hasn’t been updated in years.