WordPress Zero-Day Exploit Up For Sale On Dark Web


WordPress, a widely used content management system that powers millions of websites around the world, has become a source of concern following the discovery of an alleged zero-day vulnerability. This WordPress zero-day exploit, which is capable of compromising websites, has raised concerns about broad security flaws among website owners and cybersecurity professionals alike.

According to a dark web post, a threat actor has advertised the sale of a purported WordPress zero-day exploit compromising approximately 110,000 websites. Priced at $10,000, the alleged exploit purportedly allows the attacker to upload a file to the affected websites, potentially granting unauthorized access and control.

Description of the WordPress Zero-day Exploit

The message, disseminated on dark web forums, boasts the capabilities of the exploit, describing it as an “Autoshell” that can execute arbitrary PHP files on vulnerable WordPress installations.

The seller claims that the exploit will output a list of URLs of compromised websites, offering it for a negotiable price, albeit insisting on cryptocurrency payments only.

Source: Daily Dark Web

This revelation comes hot on the heels of a similar incident in February 2024, where an anonymous threat actor announced the sale of a WordPress Admin Authentication Bypass Exploit for $100,000.

The previous exploit, reportedly tested on WordPress versions ranging from WP6.3 to WP6.4.3, underscored the growing sophistication of cyber threats targeting popular content management systems.

The Cyber Express has contacted WordPress to verify the reported Zero-Day Vulnerability, pending confirmation, casting uncertainty on the claims made on the dark web.

WordPress Concerns and Analysis 

Following these developments, cybersecurity researchers expressed concern about the possible impact of such attacks on the security ecosystem. MalwareBytes Labs, in particular, has discovered instances of WordPress sites infected with ad fraud plugins, such as the infamous Fuser master WordPress plugin.

These plugins, while ostensibly designed to boost website traffic through legitimate means, have been exploited by cybercriminals to engage in fraudulent activities. By automatically generating fake traffic and interactions, these plugins deceive advertisers and inflate website metrics, posing a significant threat to the integrity of online advertising ecosystems.

The discovery of backdoored WordPress sites highlights the need for heightened vigilance and proactive cybersecurity measures among website owners and administrators. With cyber threats evolving at an unprecedented pace, organizations must stay abreast of emerging vulnerabilities and implement enhanced security protocols to safeguard their digital assets.

In response to these developments, cybersecurity experts emphasize the importance of regular security audits, software updates, and vigilant monitoring of website activity. Additionally, fostering a culture of cybersecurity awareness and education is essential in mitigating the risks posed by evolving cyber threats.

As the digital world continues to evolve, the dark web remains a fertile breeding ground for cybercriminal activity, with threat actors leveraging sophisticated exploits to exploit vulnerabilities in popular platforms like WordPress.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.





Source link