Description
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47415 | Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan. |
References
History
No history.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:33:05.337Z
Reserved: 2024-06-25T03:30:37.338Z
Link: CVE-2024-6297
Updated: 2024-08-01T21:33:05.337Z
Status : Deferred
Published: 2024-06-25T04:15:17.400
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6297
No data.
OpenCVE Enrichment
Updated: 2025-07-14T23:06:24Z
Weaknesses
No weakness.
EUVD