Thursday, July 4, 2024

Crucial Safety Flaw Present in In style LayerSlider WordPress Plugin

Apr 03, 2024NewsroomInternet Safety / Vulnerability

WordPress Security Flaw

A essential safety flaw impacting the LayerSlider plugin for WordPress might be abused to extract delicate info from databases, reminiscent of password hashes.

The flaw, designated as CVE-2024-2879, carries a CVSS rating of 9.8 out of a most of 10.0. It has been described as a case of SQL injection impacting variations from 7.9.11 by 7.10.0.

The problem has been addressed in model 7.10.1 launched on March 27, 2024, following accountable disclosure on March 25. “This replace contains vital safety fixes,” the maintainers of LayerSlider stated of their launch notes.

LayerSlider is a visible net content material editor, a graphic design software program, and a digital visible results that enables customers to create animations and wealthy content material for his or her web sites. In accordance with its personal website, the plugin is used by “hundreds of thousands of customers worldwide.”

Cybersecurity

The flaw found within the software stems from a case of inadequate escaping of consumer provided parameters and the absence of wpdb::put together(), enabling unauthenticated attackers to append extra SQL queries and glean delicate info, Wordfence stated.

The event follows the invention of an unauthenticated saved cross-site scripting (XSS) flaw within the WP-Members Membership Plugin (CVE-2024-1852, CVSS rating: 7.2) that would facilitate the execution of arbitrary JavaScript code. It has been resolved in model 3.4.9.3.

WordPress Security Flaw

The vulnerability, as a result of inadequate enter sanitization and output escaping, “makes it doable for unauthenticated attackers to inject arbitrary net scripts in pages that may execute at any time when a consumer accesses an injected web page which is the edit customers web page,” the WordPress safety firm stated.

Ought to the code be executed within the context of an administrator’s browser session, it may be used to create rogue consumer accounts, redirect website guests to different malicious websites, and perform different assaults, it added.

Over the previous few weeks, safety vulnerabilities have additionally been disclosed in different WordPress plugins reminiscent of Tutor LMS (CVE-2024-1751, CVSS rating: 8.8) and Contact Type Entries (CVE-2024-2030, CVSS rating: 6.4) that might be exploited for info disclosure and inject arbitrary net scripts, respectively.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles