Information security specialists from Wordfence have found the vulnerability of the Ad Inserter plugin for WordPress installed on more than 200,000 websites. The bug allows attackers remotely execute PHP code on the site.The vulnerability affects all WordPress websites with installed Ad Inserter 2.4.21 or lower.
“The weakness allowed authenticated users (Subscribers and above) to execute arbitrary PHP code on websites using the plugin”, — reported information security experts from Wordfence that discovered the vulnerability.
According to Wordfence researchers, the vulnerability is related to use of check_admin_referer () function for authorization, which is intended to protect WordPress sites from CSRF attacks. This function checks presence of one-time codes in the request (a one-time token used to prevent the processing of unwanted repeated, expired or malicious requests).
The practice is designed to ensure that users with proper rights can only access the one-time code. However, WordPress developers received caution against using one-time codes and point out in official documentation that “you should never rely on one-time codes for authentication, authorization or access control.”
Having one-time code available, authenticated attackers can bypass the authorization check and gain access to the debug mode provided by the Ad Inserter plugin.
Ad Inserter developers have already released a revised version of the plugin.
“This is considered a critical security issue, and websites running Ad Inserter 2.4.21 or below should be updated to version 2.4.22 right away”, — recommend Wordfence specialists to WordPress administrators.