Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Plugin used to inject malware in WordPress

April 24, 2023
Reading Time: 2 mins read
in Alerts

 

 

WordPress security company, Sucuri, warns of a malicious campaign where threat actors are installing the abandoned Eval PHP plugin on compromised WordPress sites to inject malicious PHP code into web pages.

Eval PHP, which has not been updated for over a decade, allows for the injection of PHP code into pages and posts, which is executed whenever the injected page or post is opened in a browser.

The plugin continues to be available through the WordPress repository, and its use has spiked from roughly 40 installations to over 100,000 within weeks. The spike is associated with a malicious campaign where attackers use the plugin to infect compromised websites.

The PHP backdoor can hide requests as cookies, making it difficult to detect. The attackers can drop the malicious code in multiple posts that are saved as drafts and remain hidden. The dropped code “uses the file_put_contents function to create a PHP script into the docroot of the website with the specified remote code execution backdoor.” By using this approach instead of dropping conventional PHP backdoors, the attackers can reinfect a compromised website when necessary while remaining hidden.

Sucuri notes that keeping old plugins in the official repository makes it easier for hackers to stay under the radar since they can install a legitimate unmodified plugin from a reputable source. It is important to re-evaluate old plugins that have been abandoned and pose a security risk.

Sucuri recommends removing unused and outdated plugins, especially those that are no longer receiving updates and have vulnerabilities that can be exploited.

Reference:
  • Massive Abuse of Abandoned Eval PHP WordPress Plugin

Tags: April 2023Cyber AlertCyber Alerts 2023PHPVulnerabilitiesWordpressWordpress plugin
ADVERTISEMENT

Related Posts

DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025
Linux Core Dump Flaws Risk Password Leaks

Linux Core Dump Flaws Risk Password Leaks

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

Google Script Used In New Phishing Scams

June 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial