Close Menu
  • Home
  • SEO
  • Digital Marketing
  • SEM
  • Marketing Trends
  • Email Marketing

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

test page

25 August 2025

SEO Content Has a Packaging Problem — Whiteboard Friday

12 October 2024

Google Shows 3 Ways To Boost Digital Marketing With Google Trends

12 October 2024
Facebook X (Twitter) Instagram Threads
Avenue AdsAvenue Ads
  • Home
  • SEO
  • Digital Marketing
  • SEM
  • Marketing Trends
  • Email Marketing
Facebook X (Twitter) Instagram
Avenue AdsAvenue Ads
SEO

WordPress Translation Plugin Vulnerability Affects +1 Million Sites

avenueadsBy avenueads27 August 2024No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
WPML WordPress plugin vulnerable to remote code execution
Share
Facebook Twitter LinkedIn Pinterest Email

[ad_1]

A vital vulnerability was found within the WPML WordPress plugin, affecting over one million installations. The vulnerability permits an authenticated attacker to carry out distant code execution, probably resulting in a complete web site takeover. It’s listed as rated 9.9 out of 10 by the Widespread Vulnerabilities and Exposures (CVE) group.

WPML Plugin Vulnerability

The plugin vulnerability is because of a scarcity of a safety examine referred to as sanitization, a course of for filtering consumer enter knowledge to guard in opposition to the add of malicious recordsdata. Lack of sanitization on this enter makes the plugin susceptible to a Distant Code Execution.

The vulnerability exists inside a operate of a shortcode for making a customized language switcher. The operate renders the content material from the shortcode right into a plugin template however with out sanitizing the info, making it susceptible to code injection.

The vulnerability impacts all variations of the WPML WordPress plugin as much as and together with 4.6.12.

Timeline Of Vulnerability

Wordfence found the vulnerability in late June and promptly notified the publishers of WPML which remained unresponsive for a couple of month and a half, confirming response on August 1, 2024.

Customers of the paid model of Wordfence acquired safety eight days after discovery of the vulnerability, the free customers of Wordfence acquired safety on July twenty seventh.

Customers of the WPML plugin who didn’t use both model of Wordfence didn’t obtain safety from WPML till August twentieth, when the publishers lastly issued a patch in model 4.6.13.

Plugin Customers Urged To Replace

Wordfence urges all customers of the WPML plugin to ensure they’re utilizing the newest model of the plugin, WPML 4.6.13.

They wrote:

“We urge customers to replace their websites with the newest patched model of WPML, model 4.6.13 on the time of this writing, as quickly as attainable.”

Learn extra in regards to the vulnerability at Wordfence:

1,000,000 WordPress Sites Protected Against Unique Remote Code Execution Vulnerability in WPML WordPress Plugin

Featured Picture by Shutterstock/Luis Molinero

[ad_2]

Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
avenueads
  • Website

Related Posts

SEO Content Has a Packaging Problem — Whiteboard Friday

12 October 2024

Google Shows 3 Ways To Boost Digital Marketing With Google Trends

12 October 2024

Google Ads announces 11-year data retention policy

12 October 2024

Reddit Makes Game-Changing Updates to Keyword Targeting

11 October 2024
Add A Comment

Comments are closed.

Advertisement
Editors Picks

10+ Super SMART Goal Examples (& A Handy Template)

22 August 2024
8.5

Apple Planning Big Mac Redesign and Half-Sized Old Mac

5 January 2021

Autonomous Driving Startup Attracts Chinese Investor

5 January 2021

Onboard Cameras Allow Disabled Quadcopters to Fly

5 January 2021
Top Reviews
9.1

Review: T-Mobile Winning 5G Race Around the World

By avenueads
8.9

Samsung Galaxy S21 Ultra Review: the New King of Android Phones

By avenueads
8.9

Xiaomi Mi 10: New Variant with Snapdragon 870 Review

By avenueads
Advertisement
Demo

Type above and press Enter to search. Press Esc to cancel.