Get a Pentest and security assessment of your IT network.

Cyber Security

5M WordPress Sites Running ‘Contact Form 7’ Plugin Open to Attack

A critical unrestricted file upload bug in Contact Form 7 allows an unauthenticated visitor to take over a site running the plugin. An attacker could also commandeer the server hosting the site if there is no containerization used to segregate the website hosting the WordPress instance. The bug hunter credited for identifying the flaw, Jinson Varghese, wrote that the vulnerability allows a user to bypass any form file-type restrictions in the plugin and upload an executable binary to a website running 5.3.1 or earlier. The plugin developer was quick to fix the vulnerability, realizing its critical nature, according to researchers.

Source: https://threatpost.com/contact-form-7-plugin-bug/162383/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security