Critical WordPress Plugin Vulnerability Could Lead to a Website Takeover

July 17, 2022

Critical WordPress Plugin Vulnerability Could Lead to a Website Takeover

According to reports, there is a new campaign targeting WordPress websites. Attackers have scanned nearly 1.6 million websites in an effort to take advantage of a previously exposed vulnerability in a WordPress plugin that allows arbitrary file uploads.

The vulnerability affects Kaswara Modern WPBakery Page Builder Addons and enables hackers to upload malicious JavaScript files and possibly take over a website entirely.

The Vulnerability

  • CVE-2021-24284., Critical (CVSS 3.1 : 9.8, Critical) – allowing an unauthenticated attacker to upload and delete files on websites running any version of the plugin and inject malicious Javascript, which might result in full site takeover.
    The attackers attempted to upload a malicious ZIP payload containing a PHP file using the plugin’s ‘uploadFontIcon’ AJAX function by sending a POST request to ‘wp-admin/admin-ajax/php’.

Affected Versions

  • Kaswara Modern VC Addons WordPress plugin through 3.0.1 (all versions)

Mitigation

Since software developers never patched the bug, and the plugin is now closed –
CYREBRO recommends removing the vulnerable plugin immediately from your WordPress site.

In addition, CYREBRO recommends blocking the following IP addresses used by the attackers:

  • 217[.]160[.]48[.]108
  • 5[.]9[.]9[.]29
  • 2[.]58[.]149[.]35
  • 20[.]94[.]76[.]10
  • 20[.]206[.]76[.]37
  • 20[.]219[.]35[.]125
  • 20[.]223[.]152[.]221
  • 5[.]39[.]15[.]163
  • 194[.]87[.]84[.]195
  • 194[.]87[.]84[.]193

References: NIST Advisory, WordFence

Sign Up for Updates