WordPress Plugin Patched After Zero Day Discovered

wordpress plugin zero day

The plugin, Social Warfare, is no longer listed after a cross site scripting flaw was found being exploited in the wild.

UPDATE

A popular WordPress plugin is urging users to update as soon as possible after it patched a vulnerability that was being exploited in the wild. If users cannot update, developers recommended they disable the plugin.

The plugin, Social Warfare, lets users add social media sharing buttons to their websites. Social Warfare has an active install base of over 70,000 sites and over 805,000 downloads. Wordfence said that the most recent version of the plugin (3.5.2) was plagued by a stored cross-site scripting vulnerability. Worse, researchers have identified attacks in the wild against the vulnerability.

“The flaw allows attackers to inject malicious JavaScript code into the social share links present on a site’s posts,” said Mikey Veenstra with Wordfence in a Thursday post.

In a tweet posted Thursday evening, Warfare Plugins urged users to log into their WordPress dashboards and update as soon as possible to version 3.5.3. “If you are not able to immediately apply this update we recommend that you disable Social Warfare and Social Warfare Pro until you can apply the V3.5.3 update,” they said.

The attacks started after a proof of concept for the vulnerability was published earlier Tuesday, said Veenstra. There is currently no evidence that attacks started prior to today, he told Threatpost.

The plugin was consequently taken down. A notice on the WordPress plugin page for Social Warfare says “This plugin was closed on March 21, 2019 and is no longer available for download.”

Meanwhile, Social Warfare tweeted that it is aware of the vulnerability: “Our developers are working to release a patch within the next hour. In the meantime, we recommend disabling the plugin. We will update you as soon as we know more.”

On Thursday, Veenstra said that Wordfence will refrain from publicizing details of the flaw and the attacks against it: “At such time that the vendor makes a patch available, we will produce a follow-up post with further information,” he said.

After patches were issued on Thursday evening, Wordfence followed up with post detailing the proof of concept and attacks.

The heart of the issue is that the Social Warfare plugin features functionality allowing users to clone its settings from another site – However, this functionality was not restricted to administrators or even logged-in users, meaning anyone could take advantage of it.

Therefore, “An attacker is able to input a URL pointing to a crafted configuration document, which overwrites the plugin’s settings on the victim’s site,” according to Wordfence.

Visitors who are redirected to these addresses are subsequently redirected to a series of malicious sites, and their individual activity is tracked via cookies.

Reports have indicated a variety of eventual redirect targets, from pornography to tech support scams, researchers said.

Social Warfare did not immediately respond to a request for comment from Threatpost.

This is not the first time WordPress has fallen victim to flaws – specifically those tied to third-party plugins. In fact, according to a January Imperva report, almost all (98 percent) of WordPress vulnerabilities are related to plugins that extend the functionality and features of a website or a blog.

The incident comes after a separate vulnerability was disclosed and patched in a different WordPress plugin, Easy WP SMTP.  This vulnerability was also under active attack and being exploited by malicious actors to establish administrative control of impacted sites, said Veenstra.

“The attacks against this vulnerability are widespread, and successful exploits can grant full control of vulnerable sites to the attackers,” he said.

This article was updated March 21 at 7:30 p.m. EST after the vulnerability was patched, and then on March 22 and 7:47 a.m. EST after the PoC was released.

Suggested articles

Discussion

  • Jennifer L Metro on

    Thanks. I saw the Wordfence article but wanted more data. Yours is the only other one at the time on Google News search. Thanks for filling in some holes, like why the wordfence article was so thin. "At this time, Veenstra said that Wordfence will refrain from publicizing details of the flaw and the attacks against it: “At such time that the vendor makes a patch available, we will produce a follow-up post with further information,” he said." And the Social Warfare tweets are helpful to see that the plugin is not abandoned.
  • Plugin Vulnerabilities on

    The "unnamed security researcher", is actually us, a service provider named Plugin Vulnerabilities. Here is the original post about the issue and the explanation for the full disclosure: https://www.pluginvulnerabilities.com/2019/03/21/full-disclosure-of-settings-change-persistent-cross-site-scripting-xss-vulnerability-in-social-warfare/
  • hirewordpressdeveloper on

    Your article Awesome Thanks for this information, very informative as well as Modern.

Leave A Reply to Jennifer L Metro Cancel Reply

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.