← Voltar para CVEs
CVE-2024-6297
CRITICAL10.0
Descricao
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Detalhes CVE
Pontuacao CVSS v3.110.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado6/25/2024
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Referencias
https://plugins.trac.wordpress.org/browser/blaze-widget/trunk/blaze_widget.php(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/contact-form-7-multi-step-addon/trunk/trx-contact-form-7-multi-step-addon.php(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/simply-show-hooks/trunk/index.php(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/social-warfare/tags/4.4.6.4/trunk/social-warfare.php#L54(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/social-warfare/tags/4.4.6.4/trunk/social-warfare.php#L583(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wrapper-link-elementor/trunk/wrapper.php?rev=3106508(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3105893/(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3106042%40social-warfare&new=3106042%40social-warfare&sfp_email=&sfph_mail=(security@wordfence.com)
https://wordpress.org/support/topic/a-security-message-from-the-plugin-review-team/(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/56d24bc8-4a1a-4e60-aec5-960703a6058a?source=cve(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/blaze-widget/trunk/blaze_widget.php(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/contact-form-7-multi-step-addon/trunk/trx-contact-form-7-multi-step-addon.php(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/simply-show-hooks/trunk/index.php(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/social-warfare/tags/4.4.6.4/trunk/social-warfare.php#L54(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/social-warfare/tags/4.4.6.4/trunk/social-warfare.php#L583(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/browser/wrapper-link-elementor/trunk/wrapper.php?rev=3106508(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset/3105893/(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3106042%40social-warfare&new=3106042%40social-warfare&sfp_email=&sfph_mail=(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/support/topic/a-security-message-from-the-plugin-review-team/(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/56d24bc8-4a1a-4e60-aec5-960703a6058a?source=cve(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.