<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>wordpress &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/wordpress/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 06 Mar 2026 18:49:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>wordpress &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered</title>
		<link>https://firsthackersnews.com/wordpress-membership-plugin-admin-account-vulnerability/</link>
					<comments>https://firsthackersnews.com/wordpress-membership-plugin-admin-account-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 18:56:01 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#adminaccess]]></category>
		<category><![CDATA[#cve20261492]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#Hacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#pluginvulnerability]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#website_security]]></category>
		<category><![CDATA[#wordpress]]></category>
		<category><![CDATA[#wordpressplugin]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<category><![CDATA[#wordpressvulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11374</guid>

					<description><![CDATA[<p>A critical WordPress plugin unauthenticated admin access vulnerability has been discovered in the User Registration &#38; Membership plugin,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-membership-plugin-admin-account-vulnerability/">WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical <strong><a href="https://firsthackersnews.com/wordpress-plugin-vulnerability/">WordPress plugin</a> unauthenticated admin access</strong> vulnerability has been discovered in the User Registration &amp; Membership plugin, allowing attackers to create administrator accounts.</p>



<p>The vulnerability, tracked as <strong>CVE-2026-1492</strong>, affects plugin versions <strong>up to 5.1.2</strong>. Since the issue can be exploited without logging in or interacting with the site, it has been given a <strong>critical CVSS score of 9.8</strong>.</p>



<p>This means attackers could potentially gain full control of affected WordPress websites.</p>



<h2 class="wp-block-heading">WordPress Plugin Unauthenticated Admin Access Vulnerability Explained</h2>



<p>The problem comes from how the plugin handles <strong>user roles during the registration process</strong>.</p>



<p>Security researcher <strong>Friderika Baranyai (Foxyyy) from Wordfence Intelligence</strong> discovered that the plugin does not properly limit which role a new user can request when registering through a membership form.</p>



<p>Normally, websites should restrict roles like <strong>administrator</strong> so that regular users cannot assign them to themselves. However, the vulnerable plugin accepts the role value sent by the user without proper validation.</p>



<p>Because of this flaw, attackers can modify the registration request and insert <strong>administrator</strong> as their role. The site then processes the request and creates a new admin account.</p>



<h2 class="wp-block-heading">Potential Impact on Websites</h2>



<p>Once attackers obtain administrator access, they can take full control of the <a href="https://firsthackersnews.com/wordpress-plugin-2/">WordPress site</a>.</p>



<p>This level of access allows them to:</p>



<ul class="wp-block-list">
<li>Install malicious plugins or backdoors</li>



<li>Steal sensitive data from the database</li>



<li>Redirect visitors to malicious websites</li>



<li>Modify website content or inject malware</li>
</ul>



<p>Security researchers have already observed <strong>active exploitation attempts</strong>. Wordfence reported blocking <strong>74 attacks targeting this vulnerability within just 24 hours</strong>, showing that attackers are quickly scanning for vulnerable sites.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading">How to Protect Your WordPress Site</h2>



<p>Website owners should take immediate steps to secure their installations.</p>



<p>The vulnerability has been <strong>patched in version 5.1.3</strong> of the User Registration &amp; Membership plugin.</p>



<p>To reduce the risk of compromise, administrators should:</p>



<ul class="wp-block-list">
<li>Update the plugin to <strong>version 5.1.3 or the latest release</strong></li>



<li>Review all <strong>administrator accounts</strong> for suspicious users</li>



<li>Remove any unknown or unauthorized accounts</li>



<li>Reset passwords and security credentials if compromise is suspected</li>
</ul>



<h2 class="wp-block-heading">Previous Security Issues</h2>



<p>This plugin has recently faced multiple security concerns. Earlier research also revealed:</p>



<ul class="wp-block-list">
<li><strong>CVE-2026-1779</strong> – an authentication bypass vulnerability</li>



<li>An authorization issue that allowed attackers to delete posts without permission</li>
</ul>



<p>Because WordPress plugins are frequently targeted, keeping software updated and using security tools like a <strong>web application firewall (WAF)</strong> can help prevent exploitation.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-membership-plugin-admin-account-vulnerability/">WordPress Plugin Unauthenticated Admin Access Vulnerability Discovered</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-membership-plugin-admin-account-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical WordPress Plugin Bug Puts 100K+ Sites at Risk</title>
		<link>https://firsthackersnews.com/wordpress-plugin-2/</link>
					<comments>https://firsthackersnews.com/wordpress-plugin-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 20 Jan 2026 18:26:49 +0000</pubDate>
				<category><![CDATA[wordpress]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Website Security]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11019</guid>

					<description><![CDATA[<p>A critical security vulnerability has been identified in the Advanced Custom Fields: Extended WordPress plugin, exposing more than</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-2/">Critical WordPress Plugin Bug Puts 100K+ Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical security vulnerability has been identified in the Advanced Custom Fields: Extended WordPress plugin, exposing more than 100,000 websites to the risk of complete compromise. The flaw allows attackers to gain full administrator access without authentication, making it especially dangerous for sites with public-facing forms.</p>



<h2 class="wp-block-heading"><strong>Vulnerability Overview</strong></h2>



<p>Tracked as <strong>CVE-2025-14533</strong>, the issue affects plugin versions up to <strong>0.9.2.1</strong> and carries a <strong>CVSS score of 9.8 (Critical)</strong>. The vulnerability arises from improper handling of user roles during account creation, allowing privilege escalation at the point of registration.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The plugin enables site owners to create custom user registration and profile forms using field groups. These forms may collect standard details such as usernames, email addresses, passwords, and user roles. While the interface appears to limit which roles can be selected, the backend logic fails to enforce these restrictions.</p>



<p>An unauthenticated attacker can submit a crafted request to a public registration form and manually assign the administrator role. Because the plugin does not validate this value before passing it to WordPress, the platform creates a new account with full admin privileges.</p>



<p>Once administrative access is obtained, an attacker has complete control over the affected website. </p>



<p>This includes the ability to install malicious plugins or themes, inject persistent backdoors, alter site content, redirect visitors to malicious destinations, and create additional administrator accounts to maintain long-term access.</p>



<h2 class="wp-block-heading"><strong>Remediation and Risk</strong></h2>



<p>The vulnerability was discovered by researchers from <strong>Wordfence</strong>, and the plugin developer has addressed the issue in <strong>version 0.9.2.2</strong>. Despite this, any site that has not applied the update and continues to expose vulnerable forms remains at high risk of exploitation.</p>



<p>Site owners are strongly advised to update immediately and review their user registration workflows to ensure no role assignment fields are exposed publicly.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-2/">Critical WordPress Plugin Bug Puts 100K+ Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-plugin-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk</title>
		<link>https://firsthackersnews.com/w3-total-cache/</link>
					<comments>https://firsthackersnews.com/w3-total-cache/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 10:41:37 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[PoC]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[w3]]></category>
		<category><![CDATA[W3 Total Cache]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10686</guid>

					<description><![CDATA[<p>A proof-of-concept (PoC) exploit has been released for CVE-2025-9501, a critical command-injection vulnerability in W3 Total Cache, one</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3-total-cache/">W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A proof-of-concept (PoC) exploit has been released for <strong>CVE-2025-9501</strong>, a critical command-injection vulnerability in <strong>W3 Total Cache</strong>, one of the most widely used caching plugins for WordPress.</p>



<p>With over <strong>1 million active installations</strong>, this flaw puts a large number of websites at risk.</p>



<p>Researchers at <strong>RCE Security</strong> found that the issue comes from how W3 Total Cache processes dynamic content. The problem lies in the <code>_parse_dynamic_mfunc</code> function inside the <code>PgCache_ContentGrabber</code> class.</p>



<p>This code uses PHP’s <strong>eval()</strong> function to execute content pulled from cached pages — which opens the door to direct code injection.</p>



<p>RCE Security analyzed WPScan’s advisory and created a working exploit to confirm how serious the vulnerability is.</p>



<p>However, the attack only works under certain conditions. An attacker must know the value of the <code>W3TC_DYNAMIC_SECURITY</code> constant in the site’s <strong>wp-config.php</strong> file.<br>Additionally:</p>



<ul class="wp-block-list">
<li>Page caching must be enabled (it’s core functionality but off by default)</li>



<li>The website must allow comments from unauthenticated users</li>
</ul>



<p>If these conditions are met, an attacker can inject malicious PHP code using crafted HTML comments in cached pages — leading to <strong>full remote code execution (RCE)</strong> on the site.</p>



<p><strong>CVE ID:</strong> CVE-2025-9501<br><strong>Vulnerability Type:</strong> Unauthenticated Command Injection / Remote Code Execution<br><strong>Affected Plugin:</strong> W3 Total Cache<br><strong>Affected Versions:</strong> Versions containing the vulnerable code in the <code>PgCache_ContentGrabber</code> class<br><strong>Attack Vector:</strong> Malicious <code>mfunc</code> comments inside cached page content<br><strong>Impact:</strong> Full Remote Code Execution &amp; Potential Server Takeover<br><strong>Status:</strong> PoC Exploit Publicly Released</p>



<p>When W3 Total Cache processes a cached page, it calls the vulnerable <code>_parse_dynamic_mfunc</code> function. This function scans the cached content for special <code>mfunc</code> comment tags.</p>



<p>If an attacker knows the value of the <code>W3TC_DYNAMIC_SECURITY</code> key, they can place malicious PHP code inside these tags. The plugin then executes this code directly on the server, giving the attacker remote command execution.</p>



<p>For example, an attacker could run:</p>



<p>echo passthru($_GET[1337])</p>



<p>Once the required conditions are met, exploitation is straightforward.<br>The level of risk depends heavily on how administrators configure W3 Total Cache.</p>



<p>Sites that use the <code>W3TC_DYNAMIC_SECURITY</code> feature with default or weak values are especially vulnerable.</p>



<p>Website administrators using W3 Total Cache should update to the latest patched version as soon as possible. If an update isn’t available, temporarily disable the Page Cache feature or restrict comments to logged-in users. </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3-total-cache/">W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/w3-total-cache/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Websites Compromised to Boost Hacker SEO</title>
		<link>https://firsthackersnews.com/blackhat-seo/</link>
					<comments>https://firsthackersnews.com/blackhat-seo/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 21:58:50 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[Blackhat]]></category>
		<category><![CDATA[compromised]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[malicious links]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SEO]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10614</guid>

					<description><![CDATA[<p>Cybercriminals are now hacking websites to insert malicious links that help boost their own search engine rankings. This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/blackhat-seo/">Websites Compromised to Boost Hacker SEO</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals are now hacking websites to insert <strong>malicious links</strong> that help boost their own search engine rankings. This technique, known as <strong>blackhat SEO</strong>, is becoming increasingly common.</p>



<p>The main goal of this campaign is to spread <strong>online casino spam</strong>, which is currently the most common type of spam found on hacked websites.</p>



<p>Attackers take advantage of weaknesses in WordPress websites to upload spam content that promotes online casinos, especially in countries where gambling is restricted.</p>



<p>To stay hidden, they use several techniques:</p>



<ul class="wp-block-list">
<li>They create duplicate folders that look identical to real website pages.</li>



<li>They replace the original page with one filled with spam links.</li>



<li>Users and search engines are redirected to these fake pages without knowing.</li>
</ul>



<p>This method works because it abuses how web servers like <strong>Apache and Nginx</strong> handle page requests before WordPress loads them.</p>



<p>Researchers at Sucuri also found a more advanced version of this malware.<br>Instead of putting malicious files only in themes or plugins, the attackers hide the code in multiple places — including inside the WordPress database with misleading names — making it much harder to detect and remove.</p>



<h2 class="wp-block-heading"><strong>Hidden Malware</strong></h2>



<p>The malware works in layers: it alters the database and loads content dynamically to stay hidden. Researchers found the malicious script added to the bottom of the theme’s <code>functions.php</code> file.</p>



<p>The malware pulls a base64-encoded payload from the WordPress option named <code>wp_footers_logic</code> and runs it with PHP’s <code>eval()</code> function. If <code>eval()</code> is disabled, it saves the decoded payload to <code>wp-content/cache/style.dat</code> instead. The payload watches incoming requests for certain URL paths and serves cached spam when those paths are matched.</p>



<p>When activated, the payload loads spam content from attacker-controlled sites (for example, <code>browsec[.]xyz</code>). To survive cleanup, the attackers also insert reinfection code into other plugin files. That reinfection code looks for specific markers; if it doesn’t find them, it will re-insert the malicious payload into the theme’s <code>functions.php</code> file and the main file of the first active plugin — ensuring the SEO spam keeps returning.</p>



<h2 class="wp-block-heading"><strong>Mitigation</strong></h2>



<p>To protect your website from SEO spam injections:</p>



<ul class="wp-block-list">
<li><strong>Keep WordPress, themes, and plugins updated</strong> — outdated components are the main entry point.</li>



<li><strong>Remove unused plugins and themes</strong> — fewer components means fewer vulnerabilities.</li>



<li><strong>Enable file integrity monitoring</strong> — detect unauthorized changes to core files like <code>functions.php</code>.</li>



<li><strong>Restrict write permissions</strong> on <code>/wp-content/</code>, <code>/wp-includes/</code>, and plugins/themes.</li>



<li><strong>Use a Web Application Firewall (WAF)</strong> to block malicious requests and known exploit patterns.</li>



<li><strong>Scan for unexpected database entries</strong> (especially unusual <code>wp_options</code> keys).</li>



<li><strong>Change all admin credentials</strong>, and enforce <strong>MFA</strong> for logins.</li>
</ul>



<p>If you suspect a compromise:</p>



<ul class="wp-block-list">
<li>Restore clean versions of core files.</li>



<li>Audit <code>functions.php</code>, plugin files, and the database for hidden code or base64 content.</li>



<li>Clear all cache directories — many SEO spam payloads hide there.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/blackhat-seo/">Websites Compromised to Boost Hacker SEO</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/blackhat-seo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports</title>
		<link>https://firsthackersnews.com/php-variable-function-malware-targets-wordpress-sites-wordfence-reports/</link>
					<comments>https://firsthackersnews.com/php-variable-function-malware-targets-wordpress-sites-wordfence-reports/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 24 Oct 2025 05:24:19 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#PHP]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[#Wordfence]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10554</guid>

					<description><![CDATA[<p>A new analysis by Wordfence security researchers has revealed a recurring malware strain that uses PHP’s variable function</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/php-variable-function-malware-targets-wordpress-sites-wordfence-reports/">PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new analysis by <strong>Wordfence security researchers</strong> has revealed a recurring <strong>malware strain</strong> that uses PHP’s <em>variable function</em> feature and browser cookies for advanced obfuscation.<br>The malware has been observed in multiple evolving variants and continues to affect <strong>WordPress environments</strong> worldwide.</p>



<h2 class="wp-block-heading"><strong>Rising Activity Detected in September 2025</strong></h2>



<p>More than <strong>30,000 malware samples</strong> of this type were detected and blocked by Wordfence during <strong>September 2025</strong>.<br>All known variants are now covered by both <strong>premium and free</strong> malware signatures provided by Wordfence.</p>



<h2 class="wp-block-heading"><strong>Variable Functions Exploited</strong></h2>



<p>PHP’s variable function capability, which allows function names to be stored in variables and executed dynamically, has been heavily abused by attackers.<br>This technique, originally meant for flexible coding, is being used to <strong>execute arbitrary commands</strong> on compromised sites.</p>



<p>For example, malicious code may assign “eval” and “base64_decode” to variables, chaining them together to download and execute remote payloads.<br>When these function names are dynamically built or encoded, detection becomes significantly harder.<br>Simple patterns like <code>eval(base64_decode())</code> are easily caught, but reordered or encoded calls can bypass traditional signature scans.</p>



<h2 class="wp-block-heading"><strong>Cookie-Based Payloads</strong></h2>



<p>The malware also replaces typical user-input triggers with <strong>browser cookies</strong>.<br>In several cases, execution occurs only when a specific number of cookies—often <strong>11 or 22</strong>—are present, along with a unique marker such as “array11.”</p>



<p>Cookie values are concatenated to rebuild PHP function names like “base64_decode” or “create_function.”<br>The payload is then decoded and executed on the server.<br>Some variants even check mathematical conditions, such as one cookie being divisible by 283, before activating.</p>



<p>Because all commands are controlled through cookies, attackers can trigger code execution without leaving visible traces in logs or form submissions.</p>



<h3 class="wp-block-heading"><strong>Key Detection Traits</strong></h3>



<p>According to Wordfence, these scripts can be identified by several behavioral clues:</p>



<ul class="wp-block-list">
<li>Unusually dense and unformatted PHP code</li>



<li>Use of variable functions</li>



<li>Conditional checks based on cookies or superglobals</li>
</ul>



<p>By focusing on these traits rather than static signatures, <strong>Wordfence’s malware engine</strong> can detect even heavily obfuscated variants.</p>



<h2 class="wp-block-heading"><strong>Ongoing Protection Efforts</strong></h2>



<p>Wordfence continues to invite researchers and users to submit undetected samples to expand their coverage.<br>Their layered defense system—including <strong>Wordfence Premium</strong>, <strong>Care</strong>, <strong>Response</strong>, and <strong>CLI tools</strong>—currently detects <strong>over 99% of known malicious variants</strong> using these obfuscation tactics.</p>



<p>The company emphasizes that vigilance and updated security plugins remain essential to keeping <strong>WordPress sites protected</strong> against evolving PHP malware threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/php-variable-function-malware-targets-wordpress-sites-wordfence-reports/">PHP Variable Function Malware Targets WordPress Sites, Wordfence Reports</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/php-variable-function-malware-targets-wordpress-sites-wordfence-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</title>
		<link>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/</link>
					<comments>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 13:19:00 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MuPlugins]]></category>
		<category><![CDATA[#WebsiteSecurity]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10414</guid>

					<description><![CDATA[<p>A highly sophisticated WordPress malware campaign has been uncovered, exploiting the seldom-monitored mu-plugins (must-use plugins) directory to gain</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/">Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A highly sophisticated WordPress malware campaign has been uncovered, exploiting the seldom-monitored <em>mu-plugins</em> (must-use plugins) directory to gain persistent access to compromised sites while avoiding detection by conventional security tools.</p>



<p>At the core of this attack is a malicious file named <code>wp-index.php</code>, which abuses WordPress’s must-use plugin functionality to ensure continuous operation that cannot be disabled via the standard admin dashboard.</p>



<p>The malware uses advanced <a href="https://blog.sucuri.net/2025/07/uncovering-a-stealthy-wordpress-backdoor-in-mu-plugins.html" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">obfuscation</mark></a> techniques, including ROT13 encoding, to conceal its communications with a remote command-and-control server.</p>



<p>Once executed, the malware fetches payloads from a hidden URL and stores them directly in the WordPress database under the option key <code>_hdra_core</code>. This tactic allows it to evade security solutions that focus mainly on filesystem changes.</p>



<p>Security researchers at Sucuri discovered this stealthy backdoor during routine investigations, highlighting its unusually effective persistence mechanisms across various infection vectors.</p>



<p>Notably, the malware creates a covert administrative user account named <strong>“officialwp”</strong> and uses WordPress filter functions to hide this account from the dashboard, masking its presence from site administrators.</p>



<p>The infection process is highly sophisticated, with the main loader script downloading base64-encoded payloads from <code>hxxps://1870y4rr4y3d1k757673q[.]xyz/cron.php</code>. When decoded, these payloads reveal a complete and robust malware framework.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="159" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1024x159.png" alt="" class="wp-image-10415" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-200x31.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-300x47.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-400x62.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-600x93.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-768x119.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-800x124.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1024x159.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1200x187.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1536x239.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The malware framework also incorporates a stealthy file manager, deceptively named “pricing-table-3.php”, which is placed within the active theme directory. This backdoor tool is shielded by a custom authentication token — “fsociety_OwnzU_4Evr_1337H4x!” — that must be sent via HTTP headers to gain access, adding an additional layer of concealment and control for the attackers.</p>



<h2 class="wp-block-heading"><strong>Database-Centric Persistence Strategy</strong></h2>



<p>The most alarming aspect of this malware is its database-centric persistence strategy. Instead of depending on traditional file-based infections—often detectable through file integrity monitoring—the backdoor embeds its payload within WordPress’s options table. It then executes this stored code and swiftly removes any temporary files created during the process, effectively minimizing forensic traces and making detection significantly more difficult.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="439" height="78" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-5.png" alt="" class="wp-image-10416" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-200x36.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-300x53.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-400x71.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5.png 439w" sizes="(max-width: 439px) 100vw, 439px" /></figure>



<p>This technique enables the malware to withstand typical cleanup procedures, ensuring its continued presence even after superficial disinfection attempts. By storing and executing its payload from the database, the attackers retain <strong>remote code execution capabilities</strong> and <strong>full administrative control</strong> over the compromised WordPress site, making the infection both resilient and deeply embedded.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/">Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control</title>
		<link>https://firsthackersnews.com/malicious-seo-plugins-wordpress-site-hijack/</link>
					<comments>https://firsthackersnews.com/malicious-seo-plugins-wordpress-site-hijack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 06 Jul 2025 04:19:26 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#MaliciousPlugins]]></category>
		<category><![CDATA[#WebsiteSecurity]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<category><![CDATA[#WPPlugins]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10368</guid>

					<description><![CDATA[<p>A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/malicious-seo-plugins-wordpress-site-hijack/">WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new wave of cyberattacks is actively compromising WordPress websites through the use of malicious SEO plugins capable of enabling full site takeovers.</p>



<p>Security researchers have identified advanced malware campaigns where threat actors disguise harmful plugins to closely mimic legitimate components within a site. This strategy significantly hampers detection efforts, allowing the malware to persist unnoticed by administrators.</p>



<p>One particularly deceptive technique involves naming the malicious plugin after the domain it infects. For instance, if the compromised site is <code>example.com</code>, the plugin directory and file might appear as <code>example-com/example-com.php</code> — making it seem like a native part of the website&#8217;s codebase.</p>



<p><strong>wp-content/plugins/exampledomain-com/exampledomain-com.php</strong></p>



<p>This naming convention allows the malicious plugin to masquerade as a custom or site-specific tool, making it difficult to detect. By mimicking the site&#8217;s own name, the malware blends in naturally with other files, evading both manual inspections and automated security scans with ease.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>Once installed, these malicious plugins often lie dormant, activating only under specific conditions—most notably when a search engine crawler accesses the website.</p>



<p>At that moment, the plugin dynamically injects spam content, such as pharmaceutical advertisements, into the site’s pages. While regular visitors see the site as normal, search engines index the injected content, unknowingly promoting the attacker’s SEO schemes. This not only boosts the attacker’s search rankings but also severely damages the credibility and search visibility of the compromised website.</p>



<p>The malicious code is heavily obfuscated, using thousands of variables and complex concatenation to hide its true purpose.</p>



<p>Cybercriminals are leveraging deceptive tactics to compromise WordPress websites through malicious plugins. These plugins often contain obfuscated code—scattered letters, numbers, and symbols that are later assembled and executed—making them extremely difficult for security tools and even experienced developers to detect.</p>



<ul class="wp-block-list">
<li><strong>Plugin Placement:</strong> The malware typically hides in the WordPress plugins directory. It often uses folder and file names that imitate the site’s domain, making it seem harmless.<br></li>



<li><strong>Code Obfuscation:</strong> Attackers insert fake plugin headers and thousands of variable assignments, creating the illusion of legitimacy.<br></li>



<li><strong>Selective Activation:</strong> The plugin activates only when search engine crawlers visit the site. This stealth tactic bypasses the attention of regular users and many automated scans.<br></li>



<li><strong>Remote Instructions:</strong> The plugin may pull instructions or SEO spam content from external servers, often using encoded formats to avoid detection.<br></li>



<li><strong>Elevated Access:</strong> Some variants allow attackers to gain administrator privileges. This enables them to create rogue admin accounts, install more malware, or completely hijack the site.</li>
</ul>



<p>Such infections can lead to data theft, defacement, and persistent backdoors that are notoriously difficult to eliminate.</p>



<h3 class="wp-block-heading"><strong>How to Protect Your WordPress Site</strong></h3>



<p>To guard against these evolving threats:</p>



<ul class="wp-block-list">
<li>Keep WordPress core, themes, and plugins updated at all times.</li>



<li>Run regular malware and backdoor scans using trusted security plugins.</li>



<li>Use strong, unique passwords for all user accounts, including admin, database, and FTP.</li>



<li>Monitor server logs and implement file integrity checks for early detection.</li>



<li>Deploy a web application firewall (WAF) to stop malicious bots and brute-force attempts.</li>



<li>If a breach is suspected, consult cybersecurity experts immediately to clean and secure your site.</li>
</ul>



<p><strong>Stay proactive</strong> &#8211; as attackers continue to refine their methods, strong defenses and constant vigilance are essential for maintaining the integrity of your WordPress website.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/malicious-seo-plugins-wordpress-site-hijack/">WordPress Under Threat: Malicious SEO Plugins Enable Full Site Control</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/malicious-seo-plugins-wordpress-site-hijack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk</title>
		<link>https://firsthackersnews.com/ti-woocommerce-wishlist-flaw/</link>
					<comments>https://firsthackersnews.com/ti-woocommerce-wishlist-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 27 May 2025 16:56:51 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[TI WooCommerce Wishlist Flaw]]></category>
		<category><![CDATA[wordpress site]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10255</guid>

					<description><![CDATA[<p>A serious security issue has been discovered in the TI WooCommerce Wishlist plugin, which is used on over</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ti-woocommerce-wishlist-flaw/">TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious security issue has been discovered in the TI WooCommerce Wishlist plugin, which is used on over 100,000 WordPress sites.</p>



<h2 class="wp-block-heading"><strong>TI WooCommerce Wishlist Flaw</strong></h2>



<p>The flaw affects version 2.9.2 and all earlier versions, allowing unauthenticated file uploads—meaning attackers can upload malicious files without logging in. This vulnerability is tracked as CVE-2025-47577.</p>



<p>The plugin normally works with tools like WC Fields Factory to let store owners add wishlist features and custom forms. But due to a coding error, attackers can upload harmful files like PHP scripts, which could let them take full control of a website.</p>



<p>The problem lies in the <code>tinvwl_upload_file_wc_fields_factory</code> function in the plugin’s code. It disables WordPress’s normal file type checks by setting <code>'test_type' =&gt; false</code>, allowing any file type to be uploaded.</p>



<p>These files can then be run directly on the server, leading to <strong>remote code execution (RCE)</strong>.</p>



<p>A serious vulnerability in the TI WooCommerce Wishlist plugin can be exploited through helper functions like <code>tinvwl_meta_wc_fields_factory</code> or <code>tinvwl_cart_meta_wc_fields_factory</code>. This only works when the WC Fields Factory plugin is also active—slightly narrowing the risk but still leaving many sites exposed.</p>



<p>This is a high-severity issue, as attackers don’t need to log in to exploit it. They can upload malicious code to your server, leading to data theft, full system compromise, or service disruption.</p>



<p>As of now, there is no patch available. The only safe action is to disable and delete the plugin to prevent attacks.</p>



<p>Users subscribed to Patchstack&#8217;s paid service (starting at $5 per site/month) are already protected against this flaw. A free Community account is required to access this protection.</p>



<p>Security experts also recommend that plugin developers and hosting providers explore Patchstack’s audit services and API to strengthen security across multiple sites.</p>



<p>The community is still waiting for an official fix from the TI Wishlist team. Until then, removal of the plugin is the safest course of action.</p>



<p>This incident is a strong reminder for all developers: never bypass default WordPress security checks, such as file validation. One small mistake can put thousands of websites at risk.</p>



<p>We will share updates as soon as a patched version is released. For now, prioritize security—stay alert and keep your WordPress site safe.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ti-woocommerce-wishlist-flaw/">TI WooCommerce Wishlist Flaw: 100,000+ Sites at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ti-woocommerce-wishlist-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress plugin vulnerability exposes websites to SQL injection</title>
		<link>https://firsthackersnews.com/wordpress-plugin-vulnerability/</link>
					<comments>https://firsthackersnews.com/wordpress-plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 24 Mar 2025 16:23:42 +0000</pubDate>
				<category><![CDATA[wordpress]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[Security updates]]></category>
		<category><![CDATA[sql injection]]></category>
		<category><![CDATA[wordpress plugin]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9849</guid>

					<description><![CDATA[<p>A critical vulnerability in the popular WordPress plugin GamiPress, identified as CVE-2024-13496, allows unauthenticated SQL injection attacks and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-vulnerability/">WordPress plugin vulnerability exposes websites to SQL injection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in the popular WordPress plugin GamiPress, identified as CVE-2024-13496, allows unauthenticated SQL injection attacks and carries a high CVSS 3.1 score of 7.5, highlighting its serious risk. </p>



<p>Discovered during a security assessment of version 7.2.1, the flaw affects all versions up to 7.3.1, making it essential for users to update to the latest secure release.</p>



<h2 class="wp-block-heading"><strong>WordPress plugin vulnerability</strong></h2>



<p>According to Abrahack, the vulnerability was found in the wp_ajax_nopriv_{$action} hook, allowing unauthenticated access.</p>



<p>The gamipress_get_logs AJAX endpoint was specifically vulnerable, as it retrieves user logs and accepts parameters that can affect database queries.</p>



<p>The gamipress_ajax_get_logs function uses the $_REQUEST array, which is passed into the gamipress_logs_shortcode function, which then queries the database through the gamipress_logs_shortcode_query function and the CT_Query class.</p>



<p>The vulnerability targets the orderby HTTP Request parameter, which is passed unsafely into an SQL query.</p>



<p>Despite restrictions like stripping white spaces and disallowing quotes, attackers can still exploit this with carefully crafted payloads.</p>



<p>A boolean time-based SQLi payload was used to demonstrate the exploit, allowing attackers to infer database information without directly extracting data.</p>



<p>The vendor fixed this issue in version 7.3.2 by implementing a whitelist for the orderby parameter, allowing only predefined columns in the gamipress_logs table, preventing SQL injection.</p>



<p>This highlights the need to properly handle user inputs in WordPress plugins. Users should update to version 7.3.2 or later to avoid potential SQL injection attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-plugin-vulnerability/">WordPress plugin vulnerability exposes websites to SQL injection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10,000+ WordPress sites exposed by donation plugin vulnerability</title>
		<link>https://firsthackersnews.com/plugin-vulnerability/</link>
					<comments>https://firsthackersnews.com/plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 05 Mar 2025 17:04:10 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[plugin vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[wordpress site]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9741</guid>

					<description><![CDATA[<p>A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/plugin-vulnerability/">10,000+ WordPress sites exposed by donation plugin vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of remote code execution since March 3, 2025.</p>



<p>Known as CVE-2025-0912, this bug lets attackers take over sites without logging in by exploiting a deserialization issue in versions 3.19.4 and earlier.</p>



<h2 class="wp-block-heading"><strong>All about the plugin vulnerability</strong></h2>



<p>The flaw comes from improper handling of the <strong>card_address</strong> field in donation forms.</p>



<p>Hackers can inject harmful PHP objects, using a technique called POP (Property-Oriented Programming) to run their own code and take full control of affected sites.</p>



<p>With a critical CVSS score of 9.8, this bug allows attackers to steal donor data, install backdoors, or hijack payments without needing to log in.</p>



<p>Researcher <strong>dream hard</strong> found the issue while reviewing the plugin’s code, warning that it’s easy to exploit and could lead to defaced sites, stolen funds, or full admin access within minutes.</p>



<p>GiveWP, used by nonprofits, religious groups, and political campaigns, handles millions in donations each year. A compromised site could face:</p>



<ul class="wp-block-list">
<li>Payment fraud through altered gateways</li>



<li>Donor data leaks (names, emails, billing info)</li>



<li>SEO poisoning with malicious redirects</li>



<li>Full site takeover for phishing attacks</li>
</ul>



<p>Wordfence detected active scans for vulnerable sites starting March 4, with at least three different attack methods seen. The plugin’s wide use by critical organizations makes timely patching essential.</p>



<h2 class="wp-block-heading"><strong>Mitigation and Response</strong></h2>



<p>GiveWP released version 3.20.0 on March 4, fixing the flaw. Site admins should:</p>



<ul class="wp-block-list">
<li>Update to version 3.20.0</li>



<li>Check logs for suspicious POST requests to <code>/wp-json/give/v1/donations</code></li>



<li>Revoke and regenerate payment API keys</li>
</ul>



<p>Wordfence warns older versions should assume compromise and recommends full malware scans and donor account monitoring.</p>



<p>Critics noted the patch came 48 hours after public disclosure, raising concerns about plugin security.</p>



<p>As of March 5, over 7,000 sites are still unpatched, while proof-of-concept exploits are already circulating. Immediate action is crucial to avoid major damage.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/plugin-vulnerability/">10,000+ WordPress sites exposed by donation plugin vulnerability</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
