Malicious PHP Scripts Injected into Compromised WordPress Plugins
CVE-2024-6297
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 25 June 2024
Summary
A significant vulnerability has emerged involving several WordPress plugins that have been compromised through malicious code injection. This vulnerability has permitted threat actors to alter the source code of multiple plugins, embedding harmful PHP scripts designed to exfiltrate sensitive database credentials. Furthermore, the compromised plugins are enabling the creation of unauthorized administrator users, thereby escalating the potential for data breaches and further exploitation. Currently, many affected plugins have not been remediated, and it is strongly advised to uninstall these plugins and conduct thorough malware scans to ensure the integrity of websites.
Affected Version(s)
BLAZE Retail Widget 2.2.5 <= 2.5.2
Contact Form 7 Multi-Step Addon 1.0.4 <= 1.0.5
Simply Show Hooks 1.2.1 <= 1.2.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved