800K WordPress Sites Still Impacted by Critical SEO Plugin Flaw
Two critical and high severity security vulnerabilities in the highly popular “All in One” SEO WordPress plugin exposed over 3 million websites to takeover attacks.
The security flaws discovered and reported by Automattic security researcher Marc Montpas are a critical Authenticated Privilege Escalation bug (CVE-2021-25036) and a high severity Authenticated SQL Injection (CVE-2021-25037).
Also Read: Battling Cyber Threats in 4 Simple Ways
Over 800,000 vulnerable WordPress sites
The plugin’s developer released a security update to address both All in One bugs on December 7, 2021.
However, more than 820,000 sites using the plugin are yet to update their installation, according to download statistics for the last two weeks since the patch was released, and are still exposed to attacks.
What makes these flaws highly dangerous is that, even though successfully exploiting the two vulnerabilities requires threat actors to be authenticated, they only need low-level permissions such as Subscriber to abuse them in attacks.
Subscriber is a default WordPress user role (just as Contributor, Author, Editor, and Administrator), commonly enabled to allow registered users to comment on articles published on WordPress sites.
Although subscribers are typically only able to edit their own profile besides posting comments, in this case, they can exploit CVE-2021-25036 to elevate their privileges and gain remote code execution on vulnerable sites and, likely, completely take them over.
Date | Downloads |
2021-12-07 | 336738 |
2021-12-08 | 1403672 |
2021-12-09 | 68941 |
2021-12-10 | 45392 |
2021-12-11 | 31346 |
2021-12-12 | 26677 |
2021-12-13 | 35666 |
2021-12-14 | 34938 |
2021-12-15 | 72301 |
2021-12-16 | 28672 |
2021-12-17 | 24699 |
2021-12-18 | 18774 |
2021-12-19 | 17972 |
2021-12-20 | 25388 |
Total | 2171176 |
WordPress admins urged to update ASAP
As Montpas revealed, escalating privileges by abusing CVE-2021-25036 is an easy task on sites running an unpatched All in One SEO version by “changing a single character to uppercase” to bypass all implemented privilege checks.
Also Read: What is Smishing? How Can We Prevent It? Explained.
“This is particularly worrying because some of the plugin’s endpoints are pretty sensitive. For example, the aioseo/v1/htaccess endpoint can rewrite a site’s .htaccess with arbitrary content,” Montpas explained.
“An attacker could abuse this feature to hide .htaccess backdoors and execute malicious code on the server.”
WordPress admins still using All In One SEO versions affected by these severe vulnerabilities (between 4.0.0 and 4.1.5.2) who haven’t already installed the 4.1.5.3 patch are advised to do it immediately.
“We recommend that you check which version of the All In One SEO plugin your site is using, and if it is within the affected range, update it as soon as possible,” the researcher warned one week ago.
0 Comments