Vulnerabilities

Flaws in Backup Migration and Elementor WordPress Plugins Allow Remote Code Execution

Critical remote code execution flaws in Backup Migration and Elementor plugins expose WordPress sites to attacks.

Critical remote code execution flaws in Backup Migration and Elementor plugins expose WordPress sites to attacks.

Critical remote code execution (RCE) vulnerabilities have been found in two popular WordPress plugins.

The affected plugins, Backup Migration and Elementor, have a combined user base of more than five million.

Elementor is the most popular of the two, with more than five million active installations. A website builder plugin, it helps administrators quickly create sites without writing a single line of code.

The plugin was recently found to be affected by an authenticated arbitrary file upload defect that allows an attacker with edit post permissions to upload arbitrary files and achieve RCE.

The issue was identified in a function that saves files to the temp directory, which performs no check on the file name, thus allowing an attacker to “supply a path traversal payload with a .php filename” that will be saved directly to the main directory.

“The interesting part is that the check on the allowed file extensions using the validate_file function is only performed after the file has already been uploaded,” WordPress security company Patchstack says.

The issue was identified in Elementor version 3.17.3 and an incomplete patch was included in version 3.18.1. On Friday, Elementor version 3.18.2 was released with a complete fix.

Backup Migration, a plugin for creating site backups and restoring them, has more than 90,000 active installations.

Advertisement. Scroll to continue reading.

A vulnerability, tracked as CVE-2023-6553 (CVSS score of 9.8), was identified in the /includes/backup-heart.php file that the plugin uses, the Wordfence team at WordPress security firm Defiant explains.

Because an attacker can control the values passed to the include, the attacker could achieve RCE on the server, without authentication.

“By submitting a specially-crafted request, threat-actors can leverage this issue to include arbitrary, malicious PHP code and execute arbitrary commands on the underlying server in the security context of the WordPress instance,” Defiant notes.

The security defect impacts Backup Migration versions 1.3.7 and earlier and was addressed with the release of versions 1.3.8. Based on WordPress statistics, millions of websites are running outdated versions of the two plugins.

Site owners, administrators, and developers are advised to update to the latest versions of Elementor and Backup Migration as soon as possible. There is no mention of any of these flaws being exploited in attacks, but unpatched vulnerabilities in WordPress plugins are often leveraged by threat actors.

Related: WordPress 6.4.2 Patches Remote Code Execution Vulnerability

Related: Recently Patched TagDiv Plugin Flaw Exploited to Hack Thousands of WordPress Sites

Related: Vulnerability in WordPress Migration Plugin Exposes Websites to Attacks

Related Content

Cybercrime

A vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and web shells into websites.

Vulnerabilities

A critical SQL injection vulnerability in the LayerSlider WordPress plugin allows attackers to extract sensitive information.

Application Security

A cross-site scripting vulnerability in the WP-Members Membership plugin could allow attackers to inject scripts into user profile pages.

Vulnerabilities

A high-severity XSS vulnerability in the Ultimate Member plugin allows attackers to inject scripts into WordPress sites.

Incident Response

The vulnerability carries a CVSS severity score of 9.8/10 and affects web sites running the Ultimate Member WordPress membership plugin.

Vulnerabilities

Attackers are exploiting a recent remote code execution flaw in the Bricks Builder WordPress plugin to deploy malware.

Vulnerabilities

WordPress 6.4.2 patches a flaw that could be chained with another vulnerability to execute arbitrary code.

Malware & Threats

A backdoor deployed on a compromised WordPress website poses as a legitimate plugin to hide its presence.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version