Malicious PHP Scripts Injected into Compromised WordPress Plugins
CVE-2024-6297

10CRITICAL

Summary

A significant vulnerability has emerged involving several WordPress plugins that have been compromised through malicious code injection. This vulnerability has permitted threat actors to alter the source code of multiple plugins, embedding harmful PHP scripts designed to exfiltrate sensitive database credentials. Furthermore, the compromised plugins are enabling the creation of unauthorized administrator users, thereby escalating the potential for data breaches and further exploitation. Currently, many affected plugins have not been remediated, and it is strongly advised to uninstall these plugins and conduct thorough malware scans to ensure the integrity of websites.

Affected Version(s)

BLAZE Retail Widget 2.2.5 <= 2.5.2

Contact Form 7 Multi-Step Addon 1.0.4 <= 1.0.5

Simply Show Hooks 1.2.1 <= 1.2.2

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.