WordPress Websites Attacked via File Manager Plugin Vulnerability

WordPress Websites Attacked via File Manager Plugin Vulnerability

  • Websites are being hijacked by hackers exploiting plugin vulnerability
  • Hackers password-protect compromised sites to keep out rival attackers
  • At-risk websites advised to update WordPress File Manager plugin immediately.

Hackers are exploiting a critical vulnerability that may be affecting hundreds of thousands of websites running WordPress.

The vulnerability lies in versions of the popular third-party plugin WordPress File Manager, which has been installed on over 700,000 websites.

WordPress File Manager bills itself as a tool to make it simple for webmasters to upload, edit, archive, and delete files and folders on their website’s backend.

But hackers have found a way to exploit version 6.8 and below of WordPress File Manager to inject malicious code onto websites without authorisation, creating backdoors for future abuse.

As security researchers at NinTechNet describe, one interesting aspect of the attack is that the hackers are injecting code into the websites they compromise to password-protect access via the flaw – thus preventing other hacking groups from exploiting the same vulnerability.

WordPress security firm Wordfence says that it has blocked over 450,000 exploit attempts in the last several days.

In a blog post, Wordfence’s Chloe Chamberland describes the potential impact of an attack:

“A file manager plugin like this would make it possible for an attacker to manipulate or upload any files of their choosing directly from the WordPress dashboard, potentially allowing them to escalate privileges once in the site’s admin area.” “For example, an attacker could gain access to the admin area of the site using a compromised password, then access this plugin and upload a webshell to do further enumeration of the server and potentially escalate their attack using another exploit.”

The makers of WordPress File Manager, issued an update (version 6.9) on September 1st that resolves the security issue, but hundreds of thousands of websites are still thought to be running out-of-date vulnerable versions of the plugin.

It should go without saying that anyone running a website should be very selective about what third-party plugins they install, keep a keen eye on security updates, and apply them as necessary.

The latest versions of WordPress includes an ability to automatically update third-party plugins like WordPress File Manager when new updates are released, although this may not be a feature that is desirable on every website.

If your website was compromised you are advised to reinstall WordPress to clean-up possibly infected core files, and change the passwords to databases and all users with administrator privileges.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top