Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Zero-Days in WordPress Plugin Actively Exploited

The commercial Total Donations plugin for WordPress is impacted by multiple zero-day vulnerabilities that are being actively exploited in attacks, Wordfence security researchers report. 

The commercial Total Donations plugin for WordPress is impacted by multiple zero-day vulnerabilities that are being actively exploited in attacks, Wordfence security researchers report. 

The critical vulnerabilities impact all known versions of the plugin, including version 2.0.5, and allow malicious actors to gain administrative access to affected WordPress sites. Due to lack of response from the plugin’s developers, users are advised to completely remove the plugin from their installations. 

Developed by Calmar Webmedia, Total Donations is meant to make the receiving of online donations easy and provides site owners with the option to view progress bars and manage tasks and campaigns. 

The plugin, Wordfence has discovered, “registers a total of 88 unique AJAX actions into WordPress, each of which can be accessed by unauthenticated users by querying the typical /wp-admin/admin-ajax.php endpoint.” 

Furthermore, the security researchers discovered that 49 of these actions can be exploited to access sensitive data, make unauthorized changes to a site’s content and configuration, and even completely take over the website. 

Total Donations allows unauthenticated users to read and update arbitrary WordPress options, and Wordfence says that malicious actors are already exploiting this issue in the wild. 

The researchers identified two functions that can be exploited to read the value of any WordPress option and multiple functions that can be used to modify the values of these options. Two functions can be used to register new user accounts with administrative privileges on the impacted site. 

Total Donations, the researchers also note, can connect to Stripe as a payment processor and can leverage Stripe’s Plans API to schedule recurring donations. However, the functions used for the interaction feature no access control and can be exploited to tamper with recurring donations. 

Advertisement. Scroll to continue reading.

An attacker could also route incoming donations to an entirely different Stripe account.

Total Donations also includes functionality to integrate its own campaigns with mailing lists, but the respective functions fail to “perform permissions checks before returning data associated with a connected account’s mailing lists.”

The plugin is impacted by various other vulnerabilities as well, allowing unauthenticated access to private and unpublished posts, leading to SQL injection, and allowing an attacker to send test emails to an arbitrary address (with automation, this could lead to Denial of Service (DoS) for outbound email). 

Wordfence reserved CVE-2019-6703 to track and reference these vulnerabilities collectively.

The researchers have been attempting to contact the plugin’s developers for the past couple of weeks but received no response. Thus, the vulnerabilities remain unpatched, despite being actively exploited.

“It is our recommendation that site owners using Total Donations delete–not just deactivate–the vulnerable plugin as soon as possible to secure their sites. The following article details the issues present in Total Donations, as well as the active attacks against the plugin,” Wordfence says. 

Related: Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress

Related: WordPress Patches Privilege Escalation Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.