What's Happening?
A new hacking campaign has been exploiting three critical vulnerabilities in the GutenKit and Hunk Companion WordPress plugins, according to security firm Defiant. The mass exploitation began on October 8, with approximately 9 million exploit attempts
blocked over a two-week period. The vulnerabilities, identified as CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972, allow attackers to upload arbitrary files and install unauthorized plugins, potentially leading to remote code execution. Despite being patched over a year ago, these vulnerabilities remain attractive targets for threat actors. The campaign involves distributing a malicious ZIP file posing as a plugin, which contains scripts that act as backdoors and allow attackers to log in as administrators, change file permissions, and execute remote code.
Why It's Important?
The exploitation of these vulnerabilities highlights ongoing security challenges for WordPress site administrators and the broader web ecosystem. With over 40,000 installations of GutenKit and 8,000 of Hunk Companion, many websites remain at risk if they have not updated to the latest patched versions. This situation underscores the importance of regular software updates and vigilance against potential security threats. The ability of attackers to gain administrative access and execute remote code poses significant risks, including data breaches and website defacement, which can have severe consequences for businesses and individuals relying on these platforms.
What's Next?
Site administrators are urged to update their plugins to the latest versions to mitigate these vulnerabilities. Defiant has shared indicators of compromise (IOCs) to help identify potential breaches. Continued monitoring and patching of WordPress plugins will be crucial in preventing future exploitation. The security community may also see increased efforts to educate users on the importance of maintaining up-to-date software and implementing robust security measures.












