Home News 100,000 WordPress Websites with the Contact Type 7 Datepicker plugin Are All Vulnerable to hack

100,000 WordPress Websites with the Contact Type 7 Datepicker plugin Are All Vulnerable to hack

by Phill

An authenticated preserved cross-site scripting (XSS) vulnerability can allow attackers to make fictitious admins on WordPress websites using Contact Type 7 Datepicker plugin.

Administrators of all WordPress websites using the Contact Form 7 Datepicker plugin are suggested to eliminate or deactivate it to prevent attackers from exploiting a saved cross-site scripting (XSS) vulnerability to make rogue admins or carrying over admin periods.

The’Contact Type 7 Datepicker’ is open source program that allows incorporating a date field into the consumer interface of this Contact Type 7 WordPress plugin, and it will be a contact type management plugin now used on more than 5 million sites. The plugin has been installed on over 100k WordPress websites using the Contact Type 7 Datepicker plugin. The defect was discovered by investigators in the Wordfence Threat Intelligence team.

Reported that the study released by WordFence. “Since the plugin programmer’s github page signaled that the plugin wasn’t any longer being maintained, we contacted the WordPress plugins group with all our disclosure, and they immediately removed the plugin in the repository for inspection ”

The plugin was closed on April 1, 2020, and is not any longer available for downloading. Its subscribers and developers confirmed it will be no longer preserved and it’s going to be definitively eliminated from the WordPress repository.

The Touch Type 7 Datepicker plugin enables users to bring a datepicker to types generated by Touch Form 7.

“To be able to process these configurations, it registered an AJAX activity calling a function that neglected to incorporate an ability test or a nonce check. Therefore, it had been possible to get a logged-in attacker with minimal permissions, including a subscriber, to send a crafted request containing malicious JavaScript that would be saved in the plugin’s settings” Continues the evaluation.

“Next time a licensed user created or altered a contact type, the saved JavaScript will be implemented in their browser, which might be used to steal an administrator’s session even make malicious administrative users”

Admins of sites utilizing the faulty plugin must hunt for an alternate to use in their sites.

Alas, the amount of attacks trying to exploit vulnerabilities in WordPress plugins has been grow.

A couple of weeks ago researchers in NinTechNet reported that an ongoing campaign that has been knowingly exploiting a zero-day defect at the WordPress Flexible Checkout Fields to get WooCommerce plugin. Other strikes lately observed are:

Jan. 2020 — An authentication bypass vulnerability from the InfiniteWP plugin which may potentially impact by over 300,000 websites.
Jan. 2020 — More than 200K WordPress websites are vulnerable to attacks because of a high seriousness cross-site request forgery (CSRF) bug in Code Snippets plugin.
Feb. 2020 — A saved cross-site vulnerability from the GDPR Cookie Consent plugin which may possibly impact 700K users.
March 2020 — Flaws from the Popup Builder WordPress plugin can enable unauthenticated attackers to inject malicious JavaScript code to popups of all 100K+ sites.
March 2010 — A important privilege escalation flaw at the WordPress SEO Plugin — Rank Math plugin may allow users to get administrator privileges.
I feel it’s extremely important to safeguard WordPress setup with dedicated alternatives, I am now using WordFence alternative, the firm provided with a permit to value the superior features.

You may also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More