WP GDPR Compliance discovered a serious vulnerability

a minute read

In the popular plugin WP GDPR Compliance , a serious vulnerability was discovered. To secure the site, you need to upgrade to version 1.4.3 or higher.

Currently, hackers are actively attacking WP-sites with this plugin. All resources with an earlier version than 1.4.3 are at risk.

Due to the vulnerability, attackers are able to gain access to the site as an administrator, which allows them to make any changes.

WordPress Plugin Hackers

According to one of the victims, the attacks are carried out automatically. Hackers use bots that crack a site through a vulnerability in the plugin, and then register accounts. After that, they start creating fraudulent pages.

According to the WPScan Vulnerability Database, the vulnerability “allows unauthenticated users to perform any actions and change any value of the database.”

You can install the revised version of the plugin by reference .

Recall that in December of this year, versions of PHP 5.6 and 7.0, which are used on 57.1% of WP sites,  will stop receiving  security updates. This means that next month the resources on which older versions are installed will become less protected.

Facebook Twitter LinkedIn Telegram Pocket

Related Posts:

A serious vulnerability was discovered in the popular WordPress WP Google Maps plugin , allowing hackers to take control of the site. This is reported on the WPScan Vulnerability Database page . At the moment, this vulnerability is already closed, and therefor...
A vulnerability such as XSS (cross-site scripting) has been discovered in the popular WordPress All-in-One SEO Pack plugin . This is reported on the website of the WPScan Vulnerability Database. Cross-site scripting (XSS) is a type of software vulnerability th...
The developers of the popular AMP plugin for WordPress – AMP for WP – have released a patch for a critical vulnerability discovered last month. While the work was underway to eliminate the vulnerability, the plugin was removed from the corresponding section on...