Critical WP-Automatic Plugin Vulnerability: Urgent Warnings and Mitigation Strategies
Hackers have recently targeted a critical vulnerability in the WP-Automatic plugin, putting thousands of WordPress websites at risk of unauthorized access and malicious activities. The flaw, identified in versions prior to 3.9.2.0 of the plugin, allows threat actors to create unauthorized admin accounts through a SQL injection flaw in the user authentication mechanism.
Cybersecurity experts have issued urgent warnings to website owners and administrators, urging them to take immediate action to secure their online assets. The vulnerability, known as “CVE-2024-27956,” has been classified as a high-severity issue with a CVSS score of 9.8, highlighting the seriousness of the threat.
Reports indicate that hackers have been actively exploiting this vulnerability, taking advantage of the widespread use of the WP Automatic plugin on over 30,000 websites. The exploit enables hackers to implant backdoors, create admin accounts, upload corrupted files, and execute SQL injection attacks.
Since the vulnerability was publicly disclosed, cybersecurity researchers have recorded over 5.5 million exploit attempts, underscoring the urgent need for website owners to update their WP-Automatic plugin to the latest version. Additionally, regular audits of user accounts, robust security monitoring tools, and maintaining up-to-date backups are recommended to mitigate the risk of compromise.
The technical details of the vulnerabilities reveal the complexity of the issue, with the vendor taking measures to remove the vulnerable files and implement validation checks to prevent further exploitation. By following these mitigation strategies and remaining vigilant for signs of compromise, website owners can enhance their defenses against cyber threats targeting WordPress ecosystems.