First published: Tue Jun 25 2024(Updated: )
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Plugins | <=Various Versions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-6297 is considered high due to the potential for database credential exfiltration and unauthorized access.
To fix CVE-2024-6297, you should immediately update any affected WordPress plugins to their latest secure versions.
CVE-2024-6297 affects several WordPress plugins that have been compromised, though the exact list may vary.
If you suspect a compromise from CVE-2024-6297, perform a thorough security audit and restore your site from a clean backup.
To prevent future vulnerabilities like CVE-2024-6297, regularly update all plugins and themes and implement strong security practices for your WordPress site.