Security News > 2024 > June > Plugins on WordPress.org backdoored in supply chain attack
A threat actor modified the source code of at least five plugins hosted on WordPress.org to include malicious PHP scripts that create new accounts with administrative privileges on websites running them.
Although it is possible that the attack impacts a larger number of WordPress plugins, current evidence suggests that the compromise is limited to the aforementioned set of five.
The malicious code in the infected plugins attempts to create new admin accounts and inject SEO spam into the compromised website.
"If you have any of these plugins installed, you should consider your installation compromised and immediately go into incident response mode." - Wordfence.
JAVS courtroom recording software backdoored in supply chain attack.
Polyfill.io JavaScript supply chain attack impacts over 100K sites.
News URL
Related news
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- LottieFiles hit in npm supply chain attack targeting users' crypto (source)
- LottieFiles hacked in supply chain attack to steal users’ crypto (source)
- LottieFiles supply chain attack exposes users to malicious crypto wallet drainer (source)