Article Details

Scrape Timestamp (UTC): 2024-04-03 05:17:08.395

Source: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html

Original Article Text

Click to Toggle View

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin. A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes. The flaw, designated as CVE-2024-2879, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as a case of SQL injection impacting versions from 7.9.11 through 7.10.0. The issue has been addressed in version 7.10.1 released on March 27, 2024, following responsible disclosure on March 25. "This update includes important security fixes," the maintainers of LayerSlider said in their release notes. LayerSlider is a visual web content editor, a graphic design software, and a digital visual effects that allows users to create animations and rich content for their websites. According to its own site, the plugin is used by "millions of users worldwide." The flaw discovered in the tool stems from a case of insufficient escaping of user supplied parameters and the absence of wpdb::prepare(), enabling unauthenticated attackers to append additional SQL queries and glean sensitive information, Wordfence said. The development follows the discovery of an unauthenticated stored cross-site scripting (XSS) flaw in the WP-Members Membership Plugin (CVE-2024-1852, CVSS score: 7.2) that could facilitate the execution of arbitrary JavaScript code. It has been resolved in version 3.4.9.3. The vulnerability, due to insufficient input sanitization and output escaping, "makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page which is the edit users page," the WordPress security company said. Should the code be executed in the context of an administrator's browser session, it can be used to create rogue user accounts, redirect site visitors to other malicious sites, and carry out other attacks, it added. Over the past few weeks, security vulnerabilities have also been disclosed in other WordPress plugins such as Tutor LMS (CVE-2024-1751, CVSS score: 8.8) and Contact Form Entries (CVE-2024-2030, CVSS score: 6.4) that could be exploited for information disclosure and inject arbitrary web scripts, respectively. The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // Critical SQL Injection Vulnerability Patched in WordPress LayerSlider

A critical SQL injection vulnerability was found in the WordPress LayerSlider plugin, potentially allowing unauthorized database access.

The vulnerability is identified as CVE-2024-2879 with a high severity CVSS score of 9.8.

Affected versions ranged from 7.9.11 to 7.10.0, with the issue resolved in the 7.10.1 version released on March 27, 2024.

The security flaw was a result of insufficient escaping of user-input parameters and the lack of wpdb::prepare() usage.

The flaw could enable attackers to retrieve sensitive data such as password hashes from websites with the vulnerable plugin installed.

The LayerSlider plugin is popular, with millions of users around the world trusting it for creating website animations and visual effects.

This incident is among several recent security disclosures affecting WordPress plugins, including WP-Members and Tutor LMS, pointing to an ongoing concern for web security.

WordPress site administrators are urged to regularly update plugins and core software to mitigate these risks.