• About
  • Disclaimer
  • Privacy Policy
  • Contact
Monday, June 9, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

WordPress Plugin Vulnerability Exposes 90,000 Websites to Assault

Md Sazzad Hossain by Md Sazzad Hossain
0
WordPress Plugin Vulnerability Exposes 90,000 Websites to Assault
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

New Provide Chain Malware Operation Hits npm and PyPI Ecosystems, Concentrating on Thousands and thousands Globally

Are They the Keys to Staying Forward?

How Can Deception Know-how Fortify Industrial IoT Networks In opposition to Cyber Threats?


A essential vulnerability within the Jupiter X Core WordPress plugin, used on over 90,000 web sites, has been recognized by safety researchers.

The flaw, found on January 6, permits attackers with contributor privileges or larger to add malicious SVG information and execute distant code on weak servers. The difficulty (CVE-2025-0366) has been given a CVSS rating of 8.8 (Excessive).

Researchers from Wordfence disclosed that the vulnerability stems from improper sanitization of SVG file uploads and the plugin’s use of the get_svg() perform, enabling attackers to bypass safety controls.

The flaw permits attackers to add specifically crafted SVG information containing PHP code. By chaining this with a vulnerability within the get_svg() perform, malicious information might be executed on the server.

“This makes it doable for authenticated attackers, with Contributor-level entry and above, to incorporate and execute arbitrary information on the server, permitting the execution of any PHP code in these information,” Wordfence wrote.

“This can be utilized to bypass entry controls, receive delicate knowledge or obtain code execution.”

Learn extra on WordPress plugin vulnerabilities: Safety Flaws in WordPress Woffice Theme Prompts Pressing Replace

The vulnerability was reported by the researcher stealthcopter on January 6 2025, by way of the Wordfence Bug Bounty Program, incomes a $782 bounty.

A patch was launched on January 29 2025 by the plugin’s developer, Artbees, that addresses the problem.

“Whereas we don’t count on this vulnerability to be broadly exploited because of the minimal user-level requirement, vulnerabilities permitting for the add of .svg information are often restricted to Cross-Website Scripting payloads and don’t usually permit distant code execution through file add, which makes this vulnerability notably fascinating,” Wordfence defined.

Customers of Jupiter X Core are strongly urged to replace to model 4.8.8 instantly.

Specialists additionally advocate adopting proactive measures, reminiscent of enabling automated updates for plugins and themes at any time when doable, to forestall exploitation. Frequently auditing put in plugins and eradicating unused or outdated ones may also scale back the assault floor.

Tags: AttackExposesPluginsitesVulnerabilityWordPress
Previous Post

Response to Hearth Injury in Okeechobee, FL

Next Post

How Laptop Imaginative and prescient Leverages Visible Information to Rework the Manufacturing Business

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

New Provide Chain Malware Operation Hits npm and PyPI Ecosystems, Concentrating on Thousands and thousands Globally
Cyber Security

New Provide Chain Malware Operation Hits npm and PyPI Ecosystems, Concentrating on Thousands and thousands Globally

by Md Sazzad Hossain
June 9, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Are They the Keys to Staying Forward?

by Md Sazzad Hossain
June 8, 2025
How Can Deception Know-how Fortify Industrial IoT Networks In opposition to Cyber Threats?
Cyber Security

How Can Deception Know-how Fortify Industrial IoT Networks In opposition to Cyber Threats?

by Md Sazzad Hossain
June 8, 2025
Scattered Spider Makes use of Tech Vendor Impersonation to Goal Helpdesks
Cyber Security

Scattered Spider Makes use of Tech Vendor Impersonation to Goal Helpdesks

by Md Sazzad Hossain
June 7, 2025
When cybercriminals eat their very own – Sophos Information
Cyber Security

When cybercriminals eat their very own – Sophos Information

by Md Sazzad Hossain
June 7, 2025
Next Post
How Laptop Imaginative and prescient Leverages Visible Information to Rework the Manufacturing Business

How Laptop Imaginative and prescient Leverages Visible Information to Rework the Manufacturing Business

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Unpatched PHP Voyager Flaws Go away Servers Open to One-Click on RCE Exploits

Unpatched PHP Voyager Flaws Go away Servers Open to One-Click on RCE Exploits

January 30, 2025
AI Improves Integrity in Company Accounting

AI Improves Integrity in Company Accounting

May 16, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Select a Cloud Supplier – Dataquest

Select a Cloud Supplier – Dataquest

June 9, 2025
DevXOps Fashions Formalize Dev Course of – IT Connection

Builders are the Beneficiaries of AI Brokers – IT Connection

June 9, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In