Vulnerability Management, Application security

Millions of WordPress sites potentially hijackable due to critical plugin bug

Share
Today’s columnist, Sebastian Gierlinger of Storyblok, offers nine tips for integrating a content management system with an ecommerce platform. (Credit: Getty Images Stock Photo)

More than four million WordPress sites could be completely compromised with the exploitation of a critical authentication bypass flaw within the Really Simple Security plugin, tracked as CVE-2024-10924, reports SecurityWeek.

Malicious actors could leverage the vulnerability, which stems from improper user check error management in the two-factor REST API action, to facilitate high-privileged account breaches that could then be used for additional attacks, according to Defiant, a WordPress security provider. The absence of error management in the event of failed user verification enables ID-based authentication and "makes it possible for threat actors to bypass authentication and gain access to arbitrary accounts on sites running a vulnerable version of the plugin," Defiant added. Administrators have been urged to ensure that their websites have Really Simple Security version 9.1.2, which has been automatically deployed by WordPress after the plugin's maintainers issued separate patches for the Pro and Free versions of the plugin.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.