Lucian Constantin
CSO Senior Writer

Critical vulnerability in WordPress newsletter plug-in endangers many blogs

news
Jul 2, 20142 mins

Attackers could exploit a flaw in the MailPoet Newsletters plug-in to take full control of vulnerable blogs, researchers from Sucuri said

A critical vulnerability found in a WordPress plug-in that has been downloaded over 1.7 million times allows potential attackers to take complete control of blogs that use it.

The flaw is located in the MailPoet Newsletters plug-in, previously known as wysija-newsletters, and was discovered by researchers from Web security firm Sucuri.

[ InfoWorld’s expert contributors show you how to secure your Web browsers in a free PDF guide. Download it today! | Learn how to protect your systems with Roger Grimes’ Security Adviser blog and Security Central newsletter, both from InfoWorld. ]

“This bug should be taken seriously; it gives a potential intruder the power to do anything he wants on his victim’s website,” Daniel Cid, Sucuri’s chief technology officer, said in a blog post Tuesday. “It allows for any PHP file to be uploaded. This can allow an attacker to use your website for phishing lures, sending SPAM, hosting malware, infecting other customers (on a shared server), and so on!”

The vulnerability was patched in MailPoet version 2.6.7, released Tuesday, so all WordPress blog administrators should upgrade the plug-in to the latest version as soon as possible if they use it.

The flaw was the result of the MailPoet developers wrongly assuming that the “admin_init” hook in WordPress is only triggered when an administrator visits pages from the administration panel, Cid said.

The MailPoet developers used admin_init to verify whether the active user is allowed to upload files, but since this hook is actually also triggered by a page accessible to unauthenticated users, the plug-in’s file upload functionality was made available to virtually anyone.

It’s easy to make this mistake and all plug-in developers should be mindful of this behavior, Cid said. “If you are a developer, never use admin_init() or is_admin() as an authentication method.”

WordPress sites are a constant target for attackers and those that get compromised are frequently used to host spam pages or malicious content as part of other attacks. Cyber criminals are running scans on the Internet every day to identify WordPress installations affected by vulnerabilities like the one found in MailPoet.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author