The Jupiter X Core WordPress plugin has been found to have critical vulnerabilities that could enable hackers to hijack websites. These vulnerabilities allow unauthorized access to accounts and the uploading of files without authentication.
Jupiter X Core, a widely used visual editor within the Jupiter X theme for WordPress and WooCommerce sites, was discovered to have these flaws by Rafie Muhammad of Patchstack, a WordPress security company. The vulnerabilities were promptly reported to ArtBee, the plugin’s developer, who addressed the issues.
Furthermore, the first vulnerability, identified as CVE-2023-38388, permits file uploads without proper authentication, potentially leading to the execution of arbitrary code on the server. This flaw has a severity score of 9.0 and affects all versions of Jupiter X Core from 3.3.5 and below. ArtBee addressed this issue in version 3.3.8 by implementing checks to prevent unauthorized file uploads and the execution of risky file types.
Additionally, the second vulnerability, CVE-2023-38389, is rated with a critical severity score of 9.8 and allows attackers to gain control of any WordPress user account if they possess the target’s email address. This flaw impacts all versions of Jupiter X Core from 3.3.8 and below. ArtBees released version 3.4.3 on August 9 to rectify the issue, recommending all plugin users to update promptly.
Rafie Muhammad explained that one vulnerability stemmed from the ‘ajax_handler’ function during the Facebook login process, enabling unauthorized users to manipulate user authentication meta values.
ArtBees’ solution involves obtaining necessary email addresses and unique user IDs directly from Facebook’s authentication endpoint to ensure a secure login process. Users are advised to upgrade to version 3.4.3 to mitigate the vulnerabilities’ risks, although no evidence of public exploitation has been found at the time of writing.