Security Advisories: Dec 09 to Dec 15, 2024

Title: WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 – Unauthenticated Local File Inclusion

Published Date: Dec 08, 2024

Risk Index: 9.2 of 10 (Critical)

Summary: A critical vulnerability has been identified in the WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. The potential consequences include, but are not limited to:

โ— Unauthorized Access:  Attackers can bypass authentication mechanisms, gaining control of files and sections of the site otherwise restricted.

โ— Sensitive Data Disclosure:  Attackers may retrieve sensitive files such as configuration files, user information, and database credentials.

โ— Remote Code Execution:  Depending on file contents and server setup, arbitrary code execution by exploiting PHP’s functionality.

โ— System Compromise:  Full system compromise may lead to the attacker establishing persistence, launching further attacks from the server, or using it as a botnet component.

Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

Published Date: Dec 10, 2024

Risk Index: 8.55 of 10 (High)

Summary: A critical vulnerability has been identified in the Windows Lightweight Directory Access Protocol (LDAP). This vulnerability allows for remote code execution, meaning an attacker can potentially gain control over an affected system.

If exploited, this vulnerability could allow an attacker to gain unauthorized control over the system by executing arbitrary code. This could lead to the installation of malicious programs, alteration or deletion of data, or creation of new user accounts with full privileges, effectively compromising the integrity, availability, and confidentiality of the information maintained by the system.

Title: Hunk Companion <= 1.8.4 – Missing Authorization to Unauthenticated Arbitrary Plugin Installation/Activation

Published Date: Oct 11, 2024

Risk Index: 9.2 of 10 (Critical)

Summary: A critical vulnerability has been identified in the Hunk Companion plugin for WordPress that allows unauthorized plugin installation and activation due to missing capability checks on the /wp-json/hc/v1/themehunk-import REST API endpoint. This flaw is present in all versions up to and including 1.8.4, enabling unauthenticated attackers to install and activate arbitrary plugins that could be leveraged for remote code execution if another vulnerable plugin is activated.

If exploited, this vulnerability could allow an attacker to gain unauthorized access to install and activate arbitrary plugins on a WordPress site. This could lead to remote code execution, especially if another activated plugin has its own security flaws. Consequently, attackers could execute arbitrary commands, deface the website, steal sensitive information, or further compromise the system’s integrity and confidentiality.

Check out our Vulnerability Notices to keep up to date with the vulnerabilities to watch out for.ย 

Share This Post On