Exploitation of the WordPress plugin puts more than a million sites at risk

Exploitation of the WordPress plugin puts more than a million sites at risk

Four serious vulnerabilities have been identified in a single WordPress plugin used by over a million websites. Bugs have been discovered affecting the Ninja Forms plugin, a drag-and-drop form builder, and could be used to control a WordPress site and redirect administrators to malicious portals. The first flaw allows site owners to redirect to arbitrary locations, taking advantage of the wp_safe_redirect function. Attackers can link with a redirect parameter that directs the site owner to a malicious URL that indicates an investigation of unusual site behavior is underway. This may be enough to convince the administrator to unintentionally click on the malicious link. The second vulnerability allows attackers to intercept email traffic, provided they have subscriber level access or higher. The third flaw allows attackers to access Ninja Forms' central admin panel by accessing the authentication key, while the fourth flaw allows threat actors to disconnect a site's OAuth connection, meaning 'there would be no way'. to delegate access'.

severe vulnerabilities

“In today's article, we detailed four flaws in the Ninja Forms plugin that allowed attackers to obtain sensitive information while redirecting administrative users,” said Chloe Chamberland, a member of the Wordfence Threat Intelligence team. “These defects have been fully fixed in version 3.4.34.1. We recommend that users immediately update to the latest version available, which is version 3.5.0 at the time of this release. "The four flaws were assigned different severity levels, with the most dangerous ones receiving a CVSS score of 9,9. However, given the popularity of the affected plugin, even the least serious threat should be fixed as soon as possible. Ninja Forms released a patch for three of the vulnerabilities on January 25, and the final flaw was fixed on February 8. Via Wordfence