Imechapishwa: Oct 12, 2024 08:51
Advisory No: TZCERT-SA-24-0033
Source: Wordfence
Software Affected: gutenkit-blocks-addon, hunk-companion, pedalo-connector
WordPress is vulnerable to critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute code remotely or retrieve sensitive data.
WordPress plugins gutenkit-blocks-addon, hunk-companion, pedalo-connector are affected by the vulnerabilities tracked as CVE-2024-9234, CVE-2024-9707, CVE-2024-9822 with CVSS scores of 9.8 each. The plugins are vulnerable due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint), a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint, and insufficient restriction on the 'login_admin_user' function. The vulnerabilities allow unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution.
Successful exploitation of these vulnerabilities may allow the attackers to take control of the affected system.
WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.