A number of new and old WordPress plugin vulnerabilities are being targeted in an attempt to redirect traffic from victims’ sites to a number of potentially harmful locations.
WordFence’s Threat Intelligence team said users of the plugins under attack are protected by individual firewall rules or generic protections built into the plugin, however, two of the vulnerabilities have firewall rules which are currently available only to premium users.
These were found several of the NicDark plugins, all of which are prefixed with –nd such as the plugin Booking (slug: nd-booking). Premium users are already protected with a patch being pushed out for free users on August 29. The other plugin being hit is the Simple 301 Redirects Addon Bulk Uploader. Premium users are protected with free receiving the firewall rule on September 5.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.