February 2nd, 2022: CyberHoot has investigated a WordPress vulnerability tracked as CVE-2022-0320, whereby a security flaw can lead to data leakage and more importantly remote code execution. The security gap affects WordPress sites using Essential Addons for Elementor, a popular editing tool for WordPress authors. This vulnerability is Internet accessible leading CyberHoot to give this a 10 out of 10 for criticality if you operate an exposed WordPress site. You must take immediate action to patch your systems to the latest version of Essential Addons for Elementor.
This security hole makes it possible for attackers to trick the plugin into accessing and including a server-side file by using a filename supplied in the incoming web request. This means a malicious visitor could trick an unpatched server into handing out a file it’s not supposed to, such as the server’s own username database, or force the server into running a script it shouldn’t, creating a remote code execution (RCE) hole.
Webserver RCE bugs are typically used to implant malware that allows the attackers to do something to your immediate detriment. Familiar examples of how cybercriminals exploit RCE bugs include:
Essential Addons for Elementor users need to check that you have version 5.0.6 or later. WordPress Elementor users can check if they have the plugin and update by following these instructions:
If you’re a subscriber to either CyberHoot’s Security Awareness Tool (SAT), or our virtual Chief Information Security Officer (vCISO) services, you’ll have access to our Policy and Process library which create your own Vulnerability Alert Management Process (VAMP) for handling these situations. This document prescribes how categorize different vulnerability alerts, and then respond in each situation according to the risk (i.e.: what time frame). If your company has not yet adopted a VAMP-like process, now is a great time to get started, but only after you patch/upgrade your WordPress site.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreA newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.