April 13, 2024

WordPress plugin vulnerability puts two million websites at risk

A preferred WordPress plugin may very well be placing round two million web sites susceptible to assault.

Thousands and thousands of WordPress-powered web sites are utilizing the Superior Customized Fields and Superior Customized Fields Professional plugins, which safety researchers say have been weak to cross-site scripting (XSS) assaults.

The excessive severity vulnerability might have allowed a malicious hacker to inject malicious scripts, resembling redirects, adverts, and different HTML content material into web site that may execute when customers visited the focused web site.

EmailSignal as much as our publication
Safety information, recommendation, and suggestions.

Fortunately, the vulnerability was mitigated considerably by the truth that it might solely be exploited by logged-in customers who had entry to the weak plugin, which means {that a} non-logged-in attacker must trick somebody who was logged in with the suitable privileges to go to a malicious URL to set off an assault.

Though that’s clearly significantly better than if the assault may very well be initiated by anybody acessing the web site, it’s nonetheless vital that affected websites are patched promptly.

Safety researcher Rafie Muhammad discovered the XSS vulnerability three days in the past, and plugin developer WPEngine launched a patch yesterday.

Directors of WordPress web sites which can be utilizing the affected plugins ought to guarantee they’ve up to date Superior Customized Fields to model 6.1.6 or later.

Acf release notes
Superior Customized Fields plugin changelog.

I exploit the Superior Customized Fields right here on grahamcluley.com, so after I first heard in regards to the vulnerability I realised I wanted to patch the plugin inside the WordPress admin console as shortly as potential.

Thankfully, it turned out that Superior Customized Fields was one of many plugins that I’ve chosen to permit to automatically update.

No proof has been offered of anybody maliciously exploiting the safety gap in weak variations of the plugin, though after all that doesn’t imply it hasn’t occurred.

Discovered this text attention-grabbing? Follow Graham Cluley on Twitter or Mastodon to learn extra of the unique content material we publish.


Graham Cluley is a veteran of the anti-virus business having labored for quite a lot of safety firms because the early Nineteen Nineties when he wrote the primary ever model of Dr Solomon’s Anti-Virus Toolkit for Home windows. Now an unbiased safety analyst, he often makes media appearances and is a world public speaker on the subject of laptop safety, hackers, and on-line privateness.
Comply with him on Twitter at @gcluley, on Mastodon at @[email protected], or drop him an e mail.