AIforWPSites

Major Security Breach: WordPress Plugin Vulnerability Exploited

A critical vulnerability in the WordPress plugin Hunk Companion has been actively exploited by cybercriminals, allowing them to install outdated and vulnerable plugins on targeted websites. This flaw, identified as CVE-2024-11972, poses significant risks to website security, enabling attackers to execute malicious code and gain unauthorized access.

Key Takeaways

  • Vulnerability Identified: CVE-2024-11972 allows unauthorized POST requests to install plugins.
  • Affected Plugin: Hunk Companion, with over 10,000 active installations, is the primary target.
  • Exploited Plugins: Attackers are installing outdated plugins like WP Query Console, which has not been updated in over seven years.
  • Security Risks: The vulnerabilities in these plugins include remote code execution, SQL injection, and cross-site scripting.
  • Urgent Action Required: Users are urged to update to version 1.9.0 of Hunk Companion to mitigate risks.

Overview Of The Vulnerability

The vulnerability in Hunk Companion allows attackers to send unauthorized requests that can install plugins from the WordPress.org repository. This capability is particularly dangerous as it enables the installation of plugins that contain known vulnerabilities, which can be exploited to compromise the security of the affected websites.

Impact On Websites

The exploitation of this vulnerability can lead to severe consequences for website owners, including:

  1. Malicious Code Execution: Attackers can execute harmful PHP code on compromised sites.
  2. Backdoor Access: A persistent backdoor can be created, allowing continued access to the site even after initial exploitation.
  3. Data Breaches: Sensitive data may be exposed or stolen, leading to potential legal and financial repercussions.

Current Status

Despite the release of a patch in version 1.9.0, only 1,800 out of 10,000 active installations have been updated. This leaves approximately 8,000 sites vulnerable to further exploitation. The researchers at WPScan, who discovered the flaw, emphasize the importance of immediate action to secure affected sites.

Recommendations For Users

To protect against this vulnerability, users of the Hunk Companion plugin should:

  • Update Immediately: Ensure that the plugin is updated to version 1.9.0 or later.
  • Audit Installed Plugins: Review all installed plugins for known vulnerabilities and remove any that are outdated or no longer maintained.
  • Implement Security Measures: Consider additional security measures such as firewalls, regular backups, and security plugins to enhance website protection.

Conclusion

The exploitation of the Hunk Companion plugin vulnerability highlights the ongoing risks associated with outdated software in the WordPress ecosystem. Website owners must remain vigilant and proactive in securing their sites against potential threats. Regular updates and security audits are essential to maintaining a secure online presence.

Sources

  • Critical flaw in WordPress plugin exploited to install malicious software | SC Media, SC Media.

Copyright © 2025 · Dynamik-Gen on Genesis Framework · WordPress · Log in

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}