A well-liked WordPress plugin could possibly be placing round two million web sites liable to assault.
Thousands and thousands of WordPress-powered web sites are utilizing the Superior Customized Fields and Superior Customized Fields Professional plugins, which safety researchers say have been susceptible to cross-site scripting (XSS) assaults.
The excessive severity vulnerability might have allowed a malicious hacker to inject malicious scripts, similar to redirects, adverts, and different HTML content material into web site that may execute when customers visited the focused web site.
Fortunately, the vulnerability was mitigated considerably by the truth that it might solely be exploited by logged-in customers who had entry to the susceptible plugin, that means {that a} non-logged-in attacker must trick somebody who was logged in with the suitable privileges to go to a malicious URL to set off an assault.
Though that’s clearly a lot better than if the assault could possibly be initiated by anybody acessing the web site, it’s nonetheless vital that affected websites are patched promptly.
Safety researcher Rafie Muhammad found the XSS vulnerability three days in the past, and plugin developer WPEngine launched a patch yesterday.
Directors of WordPress web sites which can be utilizing the affected plugins ought to guarantee they’ve up to date Superior Customized Fields to model 6.1.6 or later.
I exploit the Superior Customized Fields right here on grahamcluley.com, so once I first heard concerning the vulnerability I realised I wanted to patch the plugin inside the WordPress admin console as rapidly as attainable.
Happily, it turned out that Superior Customized Fields was one of many plugins that I’ve chosen to permit to routinely replace.
No proof has been introduced of anybody maliciously exploiting the safety gap in susceptible variations of the plugin, though in fact that doesn’t imply it hasn’t occurred.
Discovered this text fascinating? Observe Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we submit.