Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
Cybersecurity

Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites

InfovistarBy InfovistarNovember 19, 2024Updated:November 19, 2024No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
Share
Facebook Twitter LinkedIn Pinterest Email

A critical vulnerability in a popular WordPress plugin has shocked website owners. The plugin, Really Simple Security, has over 4 million installations. Hackers can exploit this flaw to take control of websites.

The vulnerability is tracked as CVE-2024-10924. Its CVSS score of 9.8 shows it is highly dangerous. Both free and premium versions of the plugin are affected.

What Is the Vulnerability?

The issue lies in the plugin’s two-factor authentication feature. A function called “check_login_and_get_user” has a critical flaw. It fails to handle user verification correctly.

Hackers can use this flaw to bypass authentication. They can log in as any user, including administrators. This happens even if two-factor authentication is enabled.

Who Found the Vulnerability in WordPress Plugin?

Wordfence researchers discovered this vulnerability. István Márton, a Wordfence expert, explained the risks. He said attackers could automate the attack to target many websites.

The vulnerability is scriptable. This means hackers can launch large-scale attacks without much effort.

The issue was responsibly disclosed on November 6, 2024. The plugin developers quickly released a patch. The fixed version, 9.1.2, became available a week later.

WordPress worked with the developers to force-update affected sites. This reduced the risk before the public disclosure.

Also read | 2M+ WordPress Sites Hit By Essential Addons For Elementor Vulnerability

What Are the Risks?

If hackers exploit this vulnerability, they can fully take over websites. They can:

  • Delete or modify site content.
  • Add malicious scripts to spread malware.
  • Steal sensitive data like user credentials.

Website hijacking can lead to criminal activities. Attackers might use compromised sites to launch further cyberattacks.

Also read | What is a digital arrest? A new deepfake tool used by cybercriminals

WordPress Plugin Security Issues

This vulnerability follows another recent WordPress flaw. The WPLMS Learning Management System plugin had a critical issue.

really-simple-ssl-auth-bypass

Before version 4.963, the WPLMS plugin allowed attackers to read and delete files, including sensitive files like wp-config.php. Deleting this file forced the site into setup mode.

Attackers could then take over the site by connecting it to a malicious database.

How to Protect Your WordPress Site

Follow these steps to secure your site from these vulnerabilities:

  1. Update Plugins Regularly
    Always keep plugins updated to their latest versions. Developers release patches to fix such issues.
  2. Remove Unused Plugins
    Unnecessary plugins can become a security risk. Remove any plugins you do not actively use.
  3. Enable Security Features
    Install reliable WordPress security plugins. Use firewalls and malware scanners to detect threats.
  4. Regular Backups
    Back up your website data regularly. This ensures you can restore it in case of an attack.
  5. Monitor Your Site
    Watch for unusual activities like unknown admin accounts or sudden traffic spikes.
  6. Check File Permissions
    Limit file permissions to protect sensitive files like wp-config.php.

Also read | Top 10 everyday apps that put your data at risk in 2024

Final Thoughts

WordPress vulnerabilities are a serious threat. This Really Simple Security plugin flaw put over 4 million sites at risk.

The issue was quickly patched, helping prevent widespread attacks. However, website owners must remain vigilant, and regular updates and security practices are essential.

Follow trusted cybersecurity blogs to stay informed. Protect your site and users from evolving threats.

Found this article interesting? Follow us on Twitter and LinkedIn for more updates!

Cybersecurity WordPress
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 7 URL Shorteners Platform for 2025
Next Article What is Langflow? A Simple Guide to Building AI Workflows
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,669 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,669 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version