Site icon LIFARS, a SecurityScorecard company

WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website

Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts from Wordfence have uncovered several flaws in the plugin that might have allowed thousands of WP websites to be exploited. Brizy is installed on more than 90,000 websites.

The vulnerabilities were discovered while performing a periodic assessment of the Wordfence firewall around August this year. Following “abnormal traffic,” it stated that the plugin did not seem to be under active assault. However, it will lead a user to believe that something was wrong with the plugin instead. The targeted visits led to the discovery of two new vulnerabilities in the plugin and a previously fixed access control vulnerability that has been reintroduced.

Following a series of unsuccessful efforts to contact the vendor, the security company reported the problem to the WordPress.org team. It then ordered to have the plugin taken down to enable the developers to create a solution. The first phase of the repair was released in early September, followed by a complete patch before the month ended. Furthermore, experts recommended instantly installing and activating the latest version of the Brizy Page Builder plugin.

 

The LIFARS process incorporates a stochastic probability of confirming a compromise, examining of both false positives and negatives to ensure accuracy during IOC identification and pattern matching to identify compromises and weak areas within the environment.

 

What Can Happen From These Vulnerabilities

The most severe concern about these vulnerabilities is that they can be utilized in conjunction with one another to permit a complete site takeover. Other concerns include the possibility of any login user editing any published posts. These login users may include harmful JavaScript in a post that can jeopardize the website or harvest information from web visitors. In addition, there is a weakness detected from this WordPress plugin that poses vulnerabilities that lets any user get remote code execution by uploading potentially executable files.

The additional loophole could be used together with the access control weakness to allow a total site takeover. Because of the nature of these vulnerabilities, any registered user or even subscriber may pose as an administrator and make changes to posts and pages. This will still be possible even if they have already been published on the site.

After which, the plugin will perform a broad number of permission checks using a pair of administrative functions. Every user who passes one of these tests will be given these functions. It will then be sufficient to log in and visit any endpoint in the WP-admin directory to pass this verification process.

Ways To Mitigate Vulnerability of a WP Plugin

Because of this possible site takeover, it is necessary to create strategies that would mitigate any exploitation. Likewise, no matter what the objective of your website is, understanding how to keep your WordPress site secure is critical to success.

Final Thoughts

As part of your effort to lessen the vulnerability of your WordPress site, be sure that you have implemented all of the security measures accessible to you and that you are regularly checking for updates. Ensuring the integrity of your website is not difficult and sometimes can be done without paying a huge amount. Likewise, if you do not take specific precautions, you may find yourself the victim of a cyberattack.

 

References

https://thecybersecurity.news/general-cyber-security-news/wordpress-plugin-exploit-puts-over-90000-sites-at-risk-13606/

https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/

https://www.itpro.co.uk/security/vulnerability/361237/wordpress-plugin-exploit-puts-over-90000-sites-at-risk

Exit mobile version