Security News > 2023 > December > Fake WordPress security advisory pushes backdoor plugin
WordPress administrators are being emailed fake WordPress security advisories for a fictitious vulnerability tracked as CVE-2023-45124 to infect sites with a malicious plugin.
The emails pretend to be from WordPress, warning that a new critical remote code execution flaw in the platform was detected on the admin's site, urging them to download and install a plugin that allegedly addresses the security issue.
The entry for the fake plugin shows a likely inflated download count of 500,000, along with multiple phony user reviews elaborating on how the patch restored their compromised site and helped them thwart hacker attacks.
The malicious plugin hides itself from the list of installed plugins, so a manual search on the site's root directory is required to remove it.
WP Fastest Cache plugin bug exposes 600K WordPress sites to attacks.
Hackers exploit critical flaw in WordPress Royal Elementor plugin.
News URL
Related news
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-21 | CVE-2023-45124 | Rejected reason: It is a duplicate. | 0.0 |