Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WordPress plugin actively exploited

April 3, 2023
Reading Time: 2 mins read
in Alerts

 

A high-severity vulnerability in the Elementor Pro WordPress plugin is being actively exploited by threat actors, according to WordPress security firm PatchStack. The paid plugin is currently installed on over 11 million websites and is used to create WordPress sites.

The vulnerability was reported on March 18 by security researcher Jerome Bruandet from NinTechNet. The flaw impacts version v3.11.6 and all versions before it, allowing authenticated users to change the site’s settings and potentially lead to a complete site takeover when Elementor Pro is installed on a site that has WooCommerce activated.

The flaw is a broken access control on the plugin’s WooCommerce module, “elementor-pro/modules/woocommerce/module.php.”

Anyone can exploit the issue to change WordPress settings in the database. The flaw is exploited through a vulnerable AJAX action, “pro_woocommerce_update_page_option,” which is used by Elementor’s built-in editor. The issue stems from improper input validation and a lack of capability check to restrict its access to a high privileged user only.

PatchStack researchers are observing attacks from multiple IP addresses, with most of them coming from IP addresses 193.169.194.63, 193.169.195.64, and 194.135.30.6. The researchers also reported that the attackers are changing site URLs to away[dot]trackersline[dot]com. The experts are also seeing files being uploaded with the following file names: wp-resortpack.zip, wp-rate.php, and lll.zip.

The researchers urge administrators of WordPress sites using Elementor Pro to upgrade to version 3.11.7 or later immediately. It is important for website administrators to take swift action to update their plugins to protect their sites from attacks that exploit vulnerabilities such as the one identified in the Elementor Pro WordPress plugin.

Failure to take these actions can lead to the takeover of the website, the modification of site content, and the theft of sensitive information.

 

Reference:
  • High severity vulnerability fixed in WordPress Elementor Pro plugin

Tags: April 2023Cyber AlertCyber Alerts 2023Cyber AttacksVulnerabilitiesWordpress
ADVERTISEMENT

Related Posts

COLDRIVER Hackers Target Sensitive Data

COLDRIVER Hackers Target Sensitive Data

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

CoGUI Targets Consumer and Finance Brands

May 8, 2025
Critical Kibana Flaws Allows Code Execution

Mirai Botnet Exploits Vulnerabilities in IoT

May 7, 2025
Critical Kibana Flaws Allows Code Execution

Critical Kibana Flaws Allows Code Execution

May 7, 2025
Critical Kibana Flaws Allows Code Execution

New OttoKit Flaw Targets WordPress Sites

May 7, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial