Cybercrime

WordPress Sites Targeted via Vulnerabilities in WooCommerce Discounts Plugin

The owners and administrators of e-commerce websites powered by WordPress and the WooCommerce platform have been warned of attacks exploiting vulnerabilities discovered recently by researchers in a discounts plugin.

<p><strong><span><span>The owners and administrators of e-commerce websites powered by WordPress and the WooCommerce platform have been warned of attacks exploiting vulnerabilities discovered recently by researchers in a discounts plugin.</span></span></strong></p>

The owners and administrators of e-commerce websites powered by WordPress and the WooCommerce platform have been warned of attacks exploiting vulnerabilities discovered recently by researchers in a discounts plugin.

The flaws were identified on August 7 by researchers at web security company WebARX in Discount Rules for WooCommerce, a plugin that has been installed on over 30,000 websites and which allows users to create various types of discounts for their products. The developer patched the vulnerabilities within a week with the release of version 2.1.0.

However, it’s now important that website administrators update the plugin as WebARX says it has been seeing attacks exploiting the vulnerabilities.

The flaws have been described as SQL injection, stored cross-site scripting (XSS) and authorization-related issues. Exploitation of the stored XSS weakness can allow an unauthenticated attacker to execute arbitrary code.

WebARX told SecurityWeek that an attacker looking to exploit the vulnerabilities would first have to crawl the internet for affected WordPress websites by looking for the “woocommerce” string in their source code. Once a potential target has been found, they can send it a malicious payload.

In the attacks observed by WebARX, the cybercriminals are injecting a JavaScript file that redirects visitors to their own site, which most likely contains advertisements and malware.

“Since the issue allows the attacker to inject the payload into any template hook(s) they desire, it could be used to trigger other exploits if the site has other vulnerable plugins installed but we have not seen such payload yet,” WebARX explained. “Since HTML/JavaScript can be injected into any template hook, this could be abused to execute unwanted actions on the administration pages of the site and thus potentially leading to remote code execution.”

A study conducted recently by WebARX showed that web professionals are increasingly concerned about website security. Nearly 43% of the respondents who took part in the company’s survey said they had seen an increase in attacks, and a quarter of them had seen a website being hacked in the month leading up to the survey.

Advertisement. Scroll to continue reading.

The top challenges cited by professionals when dealing with website security were lack of knowledge, blocking and preventing attacks, plugin and third-party code vulnerabilities, software updates, and client education.

Related: WPvivid Backup Plugin Flaw Leads to WordPress Database Leak

Related: Flaw in WordPress Themes Plugin Allowed Hackers to Become Site Admin

Related: WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version