Hackers to Use XSS Vulnerability in WP Plugin

Online stores are the victims of hacker attacks, but the patch is already available
14 March 2019   6357

Hackers install backdoors on websites of online stores through XSS vulnerability in WordPress plugin. Only administrators and privileged users can use the plugin - this allows you to run malicious code with high-level rights.

The plugin Abandoned Cart Lite for WooCommerce has more than 20 thousand downloads, it is widely distributed. The developers have already released a patch in version 5.2.

WordPress Has Many Vulnerabilities, - RiskSense

According to the latest study on vulnerabilities in web frameworks and platforms, WordPress & Apache Struts have 57% of all vulnerabilities
19 March 2020   167

RiskSense published the results of an analysis of 1622 vulnerabilities in frameworks and platforms for the web, identified from 2010 to November 2019. Some conclusions:

  • WordPress and Apache Struts account for 57% of all vulnerabilities for which exploits are prepared for attacks. Next up are Drupal, Ruby on Rails and Laravel. The list of platforms with exploitable vulnerabilities also lists Node.js and Django, but they found one vulnerability with an exploit of 56 and 66 existing vulnerabilities. Of the most common vulnerabilities in WordPress, cross-site scripting is called, and in Apache Struts, problems with checking input data.
  • Projects in PHP and Java are leading in the number of vulnerabilities with existing exploits.
  • In 2019, the total number of vulnerabilities decreased, but the share of exploit vulnerabilities increased from 3.9% to 8.6%, mainly due to the increase in the number of exploits for Ruby on Rails, WordPress, and Java.
  • Cross-site scripting (XSS) is the most common vulnerability in a sample over 10 years. Vulnerabilities caused by incorrect verification of input data (24% of all vulnerabilities with exploits) are leading in the sample over 5 years, and XSS fell to 5th place.
  • Vulnerabilities that allow the substitution of SQL, code, and commands are relatively rare, but they are leading in terms of exploit availability - exploits were prepared for more than 50% of such vulnerabilities (60% for command substitution and 39% for code substitution).

Get more at the official press release.