Vulnerability Management, Application security, Threat Intelligence

Critical flaw in WordPress plugin exploited to install malicious software

Credit: Adobe Stock Images

BleepingComputer reports that a zero-day vulnerability in the WordPress plugin called Hunk Companion is being actively exploited by threat actors, who are using it to install outdated and vulnerable plugins from the WordPress.org repository.

The installed plugins contain exploitable flaws, such as remote code execution, SQL injection, and cross-site scripting, allowing attackers to compromise targeted websites.

The flaw, identified as CVE-2024-11972, allows unauthorized POST requests to install plugins arbitrarily. Hunk Companion, a plugin that supports customizable themes by ThemeHunk, has over 10,000 active installations. Researchers at WPScan, who first discovered the vulnerability, observed attackers using this flaw to install outdated plugins such as WP Query Console, which was last updated over seven years ago. Hackers exploit this to execute malicious PHP code, creating persistent backdoor access through a PHP dropper uploaded to the site’s root directory. The vulnerability impacts all versions before 1.9.0, which was released to address the issue. A related flaw, CVE-2024-9707, was patched earlier but proved insufficient as attackers bypassed the fix. The researchers are urging Hunk Companion users to update to version 1.9.0 immediately. Despite the patch, only 1,800 sites have been updated, leaving around 8,000 sites vulnerable to further exploitation.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds