Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Serious Vulnerability Patched in Popular Newsletter WordPress Plugin

Researchers from Sucuri have identified a remote file upload vulnerability in a popular WordPress plugin that has been downloaded more than 1.7 million times. The security hole has been patched by the developers.

Researchers from Sucuri have identified a remote file upload vulnerability in a popular WordPress plugin that has been downloaded more than 1.7 million times. The security hole has been patched by the developers.

According to the security company, the affected plugin is MailPoet, which enables WordPress users to easily create newsletters, post notifications and create autoresponders.

The flaw can be exploited by an attacker to upload any PHP file to affected websites, allowing them to abuse the site for phishing, spam, malware attacks and other malicious activities, Sucuri said. It’s worth noting that the attacker doesn’t need to have any accounts or privileges on the targeted website for the attack to work.

While they haven’t provided many technical details of the vulnerability to prevent abuse, Sucuri explained that the security hole is a result of an erroneous assumption made by the developers.

“The vulnerability resides in the fact that the developers assumed that WordPress’s “admin_init” hooks were only called when an administrator user visited a page inside /wp-admin/,” Daniel Cid, the CTO and founder of Sucuri, wrote in a blog post. “It is a easy mistake to make and they used that hook (admin_init) to verify if a specific user was allowed to upload files. However, any call to /wp-admin/admin-post.php also executes this hook without requiring the user to be authenticated. Thus making their theme upload functionality available to everybody.”

Cid advises developers never to use admin_init() or is_admin() as an authentication method.

The developers of MailPoet were notified of the existence of the vulnerability a few weeks ago, and they released version 2.6.7 of the plugin on Tuesday to address the issue. All previous versions of the application are affected so users are advised to update their installations as soon as possible.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.