Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Nation-State Cyber Ecosystems Weakened by Sanctions, Report Reveals

October 28, 2025

3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

October 28, 2025

Chrome Zero-Day Actively Exploited in Attacks by Mem3nt0 mori

October 28, 2025
Facebook X (Twitter) Instagram
Tuesday, October 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Critical WordPress Plugin Bugs Exploited En Masse
News

Critical WordPress Plugin Bugs Exploited En Masse

Team-CWDBy Team-CWDOctober 27, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Threat actors are attempting to exploit three critical CVEs from 2024 impacting two popular WordPress plugins, according to Wordfence.

The security vendor claimed that the bugs affect the GutenKit and Hunk Companion plugins which have over 40,000 and 8000 active installations respectively.

“These vulnerabilities make it possible for unauthenticated threat actors to install and activate arbitrary plugins, which can be leveraged to achieve remote code execution [RCE],” it warned in an update late last week.

Wordfence said it discovered the vulnerabilities via its bug bounty program on September 25 and October 3 2024. But while its customers are protected via updated firewall rules, the same is not true for all organizations using the plugins.

Read more on WordPress vulnerabilities: Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

The vendor has already blocked nearly 8.8 million exploitation attempts, hinting at the scale of the campaign, which sprang back to life on October 8.

The three CVEs currently under exploitation are:

  • CVE-2024-9234: An RCE bug which enables unauthenticated attackers to install and activate arbitrary plugins, or use the functionality to upload arbitrary files spoofed like plugins. It has a CVSS rating of 9.8 and affects all versions of the GutenKit – Page Builder Blocks, Patterns and Templates for Gutenberg Block Editor plugin, up to and including 2.1.0
  • CVE-2024-9707: A critical vulnerability which makes it possible for unauthenticated attackers to install and activate arbitrary plugins. These can be used to achieve RCE if another vulnerable plugin is installed and activated. This bug has a CVSS score of 9.8 and affects all versions of the Hunk Companion plugin for WordPress up to and including 1.8.4
  • CVE-2024-11972: A critical unauthorized plugin installation/activation vulnerability, which affects all versions of the Hunk Companion plugin for WordPress, up to and including 1.8.5. It has a CVSS score of 9.8. This is a bypass for CVE-2024-9707 which enables unauthenticated attackers to install and activate arbitrary plugins for RCE, if another vulnerable plugin is installed and activated

The vulnerabilities allow threat actors to “easily” hijack targeted sites by uploading PHP files and executing malicious code on the server, Wordfence warned.

The vendor released a list of attacker IP addresses and domains which could help network defenders to better improve resilience to such attacks.

Image credit: Wirestock Creators / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
Next Article Your First and Last Line of Defense
Team-CWD
  • Website

Related Posts

News

Nation-State Cyber Ecosystems Weakened by Sanctions, Report Reveals

October 28, 2025
News

3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

October 28, 2025
News

Investment Scams Spread Across Asia With International Reach

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.