Exposed: Hackers Manipulate Unpatched WordPress Plugin
As website design and SEO experts that work closely with managed service providers and IT clients, we believe that we should inform people about the latest in cybersecurity threats, especially when it comes to websites built in WordPress. A recently unpatched WordPress plugin, Ultimate Member, has left as many as 200,000 WordPress websites at risk of cyber attacks.
The Ultimate Member Unpatched WordPress Plugin
The flaw, identified as CVE-2023-3460 and carrying a high CVSS score of 9.8, affects all versions of the Ultimate Member plugin, including the latest release, version 2.6.6. This plugin, known for enabling user profiles and community creation, as well as account management, has unfortunately become a target for malicious actors.
Leading WordPress security firm WPScan has described this situation as a very serious issue. Unauthenticated attackers have the potential to exploit this vulnerability by creating new user accounts with administrative privileges.
This unauthorized access grants them complete control over affected sites, posing a significant threat to your website’s integrity and security.
While specific details about the flaw have not been disclosed due to ongoing abuse, it stems from inadequate blocklist logic. Attackers can exploit this vulnerability by modifying the wp_capabilities user meta value of a new user, effectively elevating their privileges to that of an administrator.
Wordfence researcher Chloe Chamberland explains that although the plugin has a pre-defined list of banned keys that users should not be able to modify, there are ways to bypass these filters. Attackers can leverage various cases, slashes, and character encoding to supply a meta key value that exploits vulnerable versions of the plugin.
Instances of rogue administrator accounts being added to affected sites have raised alarm bells. To address the issue, the plugin maintainers have released partial fixes in versions 2.6.4, 2.6.5, and 2.6.6. However, it is important to note that WPScan has deemed these patches incomplete, with several methods to circumvent them still being discovered. This means the vulnerability remains actively exploitable.
In observed attacks, threat actors have utilized the flaw to register new accounts under various names, including apadmins, se_brutal, segs_brutal, wpadmins, wpengine_backup, and wpenginer. Once inside, they upload malicious plugins and themes through the site’s administration panel, further compromising website security.
What You Should Do
We strongly advise users of the Ultimate Member plugin to disable it immediately until a comprehensive patch is released. Additionally, it is crucial to conduct an audit of all administrator-level users on your website to identify any unauthorized accounts that may have been added.
The Ultimate Member authors have responded to this situation by releasing version 2.6.7 of the plugin on July 1. This update addresses the actively exploited privilege escalation flaw. The authors have also included a new feature that allows website administrators to reset passwords for all users, adding an extra layer of protection.
In their advisory, Ultimate Member maintainers explain that version 2.6.7 introduces whitelisting for meta keys used during form submissions. They have also separated form settings data and submitted data, treating them as two distinct variables. These enhancements aim to mitigate the vulnerability and safeguard your website from potential attacks.
Next Steps
At BigOrange Marketing, we prioritize the security and success of our clients. We urge you to take immediate action by disabling the Ultimate Member plugin and applying the necessary updates as soon as they become available.
By doing so, you’ll ensure the continued integrity and safety of your WordPress website.Want more WordPress expertise? Contact us today for a non-salesy discussion on how creating the right StoryBranded website could take your organization to the next level.
Share the knowledge
Learn How to Leverage AI to Create Marketing Campaigns at CompTIA
Gone are the days of marketing campaign planning taking hours upon hours to complete. With our ChatGPT strategy you do not need to spend hours…
Explore this TopicWe’ll See Ya at CompTIA’s ChannelCon 2024
The CompTIA ChannelCon 2024 will be here before we know it. BigOrange Marketing’s CEO, Margee Moore, will be meeting attendees at our booth and giving…
Explore this TopicWhat Are the 7 Steps of StoryBrand?
The 7 steps of StoryBrand are designed to create a clear and attention-grabbing narrative that positions the customer as the hero and your brand as…
Explore this TopicWhat Are Examples of StoryBrand BrandScript?
If you’re up to date with the digital marketing world, chances are you’ve heard about the StoryBrand BrandScript. As a StoryBrand certified guide, we offer…
Explore this TopicMastering Vendor Partnerships: Tips for Effective Vendor Management Webinar
Effective vendor management is crucial to ensuring your business’s success and future growth, especially for managed service providers (MSPs). In such a competitive industry, mastering…
Explore this TopicHow to Tell the Tale: What Is a StoryBrand BrandScript?
What Is a StoryBrand BrandScript? A StoryBrand BrandScript is a script that summarizes your key message as an exciting and easily readable story. It’s based…
Explore this TopicGet Leads And Grow: 21 MSP Marketing Best Practices for 2024
Our own CEO Margee Moore presented her talk to ChannelPro in June. We were delighted to share MSP marketing best practices for 2024 and marketing…
Explore this TopicHow Is a StoryBrand Brandscript Used?
A StoryBrand Brandscript is a powerful tool that helps businesses clarify their messaging by structuring their brand story in a way that resonates with their…
Explore this Topic