Home > NewsRelease > Over 280,000 WordPress sites attacked using WPGateway plugin zero-day vulnerability, reports The Hacker News
Text
Over 280,000 WordPress sites attacked using WPGateway plugin zero-day vulnerability, reports The Hacker News
From:
Capitol Communicator -- PR News in Washington, D.C. Capitol Communicator -- PR News in Washington, D.C.
For Immediate Release:
Dateline: Washington, DC
Sunday, September 18, 2022

 

A flaw in the latest version of a WordPress premium plugin known as WPGatewayis being actively exploited in the wild, potentially allowing malicious actors to completely take over affected sites,” reports The Hacker News.

The WPGateway plugin is a premium plugin tied to the WPGateway cloud service, which offers its users a way to setup and manage WordPress sites from a single dashboard.

The Hacker News adds: “Tracked as CVE-2022-3180 (CVSS score: 9.8), the issue is being weaponized to add a malicious administrator user to sites running the WPGateway plugin, WordPress security company Wordfence noted.

“”Part of the plugin functionality exposes a vulnerability that allows unauthenticated attackers to insert a malicious administrator,” Wordfence researcher Ram Gall said in an advisory.

“WPGateway is billed as a means for site administrators to install, backup, and clone WordPress plugins and themes from a unified dashboard.

“The most common indicator that a website running the plugin has been compromised is the presence of an administrator with the username “rangex.”

“Additionally, the appearance of requests to “//wp-content/plugins/wpgateway/wpgateway-webservice-new.php?wp_new_credentials=1” in the access logs is a sign that the WordPress site has been targeted using the flaw, although it doesn’t necessarily imply a successful breach.

“Wordfence said it blocked over 4.6 million attacks attempting to take advantage of the vulnerability against more than 280,000 sites in the past 30 days.

“Further details about the vulnerability have been withheld owing to active exploitation and to prevent other actors from taking advantage of the shortcoming. In the absence of a patch, users are recommended to remove the plugin from their WordPress installations until a fix is available.

“The development comes days after Wordfence warned of in-the-wild abuse of another zero-day flaw in a WordPress plugin called BackupBuddy.”

More here.

Capitol Communicator is a unique online and offline resource for Mid-Atlantic advertising, marketing, public relations, digital and media communications professionals. The e-magazine, e-newsletters and events bring together communications professionals, fostering community and providing important information; news; trends; education; and opportunities for networking, career enhancement, business exchange and showcasing great work. Visit www.capitolcommunicator.com to learn more.

News Media Interview Contact
Name: Paul Duning
Group: Capitol Communicator
Dateline: Washington, DC United States
Direct Phone: 202-744-2339
Cell Phone: 202-744-2339
Jump To Capitol Communicator -- PR News in Washington, D.C. Jump To Capitol Communicator -- PR News in Washington, D.C.
Contact Click to Contact