Description
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Published: 2024-06-25
Score: 10 Critical
EPSS: 4.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47415 Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
History

No history.

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:33:05.337Z

Reserved: 2024-06-25T03:30:37.338Z

Link: CVE-2024-6297

cve-icon Vulnrichment

Updated: 2024-08-01T21:33:05.337Z

cve-icon NVD

Status : Deferred

Published: 2024-06-25T04:15:17.400

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-6297

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-14T23:06:24Z

Weaknesses

No weakness.