"WordPress Plugin Vulnerability Leaves Sites Open to Total Takeover"

The security firm WordFence warns of an actively exploited flaw in a widely used WordPress plugin that could leave websites completely vulnerable to hackers. WPGateway is a paid plugin that allows WordPress users to manage their websites from a single dashboard. The flaw, tracked as CVE-2022-3180, enables threat actors to add their own profile to the dashboard and completely take control of a victim's website. Total website takeover could result in the exfiltration of sensitive financial information, the destruction of critical data, or the takedown of a company's entire website. Threat actors could use the control to launch phishing or malware campaigns through trusted websites, potentially causing widespread damage to systems and ruining the reputation of affected companies. WordPress website administrators who use WPGateway should be on the lookout for the addition of an administrator titled 'rangex,' which indicates that the website has been breached by threat actors. This is not the first time a WordPress plugin has exposed sites to similar vulnerabilities. For example, over 90,000 websites were put at risk of a total takeover in 2021 due to a flaw in Brizy Page Builder, a plugin that allows users to build websites with 'no-code.' In 2020, hackers used similar exploits in the Elementor plugin to install backdoors into a website's Content Management System (CMS) for total control. This article continues to discuss the WPGateway plugin vulnerability exposing WordPress sites to hacking. 

ITPro reports "WordPress Plugin Vulnerability Leaves Sites Open to Total Takeover"

Submitted by Anonymous on