Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

WordPress plugin vulnerability exploited: 3,300 sites compromised so far

Hackers are targeting outdated versions of the Popup Builder plugin

3 min. read

Published onMarch 11, 2024

published onMarch 11, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

Hackers have once again exploited a vulnerability in outdated versions of the Popup Builder plugin of WordPress sites. According to PublicWWW, thismalicious code has infected 3300 websitesby this new campaign.

The flaw used to attack the websites is CVE-2023-6000, a cross-site scripting (XSS) vulnerability affecting Popup Builder versions 4.2.3 and older. The information was disclosed first in November 2023.

This vulnerability was also used in the Balada Injector campaign and infected 6700 sites, which indicates site administrators haven’t taken the necessary actions to prevent it from happening.

Sucuri was the first one toreportthe new campaign and the code injections related to it are found in 3329 WordPress websites.

When Sucuri used their remote malware scanner, they found the malware on more than 1,170 sites. The blog post also mentioned:

These attacks are orchestrated from domains less than a month old, with registrations dating back to February 12th, 2024:

Details of Injection

The attacks leveraged a known vulnerability in the Popup Builder plugin to infect the Custom CSS or Custom JavaScript section of the WordPress admin interface. However, the malicious code is internally stored in the wp_postmeta database table.

The main feature of the injected code is to work as event handlers for several Popup Builder plugin events, includingsgpb-ShouldClose,sgpbWillClose,sgpb-ShouldClose,gpb-DidClose,sgpb-WillOpen,sgpbDidOpenandsgpb-ShouldOpen.

Now, when a pop-up opens or closes or if a specific action is performed, the malicious code will be executed along with it.

However, Sucuri didn’t mention the exact actions of the code, but one of the main aims of the injections could be redirecting site visitors to an infected website or malicious destinations, including malware-dropping sites, phishing pages, etc.

In some instances, the “hxxp://ttincoming.traveltraffic[.]cc/?trafficURL was seen injected as a redirect URL parameter for a contact form-7 pop-up.

This injection retrieves the malicious code snippet from an external and injects it into a web page’s header, which enables its execution by the browser.

Mitigation and removal

As mentioned earlier, the attack originated fromincoming.traveltraffic[.]ccandhost.cloudsonicwave[.]com, so the first step is to block these domains.

Next, if you are using the Popup Builder plugin on your website, update it to the latest version, which is4.2.7. This will fixCVE-2023-6000and previous security issues.

According to WordPress statistics, it has80,000 active sites, which are 4.1 and older versions of Popup Builder, so the number of sites getting infected could go higher.

If your site is already infected, you need to delete the malicious entries from the Popup Builder’s custom sections. Furthermore, scan your site at both client and server levels for hidden backdoors and other possible security issues.

The persistent and stronger malware attacks are a scary reminder for all WordPress users not to use an outdated version of any plugin or tool on the site. Moreover, you should also keep scanning the site and install all the latest security updates as they are available.

What are your thoughts on the matter? Share your opinions in the comments section below.

More about the topics:WordPress

Srishti Sisodia

Windows Software Expert

Srishti Sisodia is an electronics engineer and writer with a passion for technology. She has extensive experience exploring the latest technological advancements and sharing her insights through informative blogs.

Her diverse interests bring a unique perspective to her work, and she approaches everything with commitment, enthusiasm, and a willingness to learn. That’s why she’s part of Windows Report’s Reviewers team, always willing to share the real-life experience with any software or hardware product. She’s also specialized in Azure, cloud computing, and AI.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Srishti Sisodia

Windows Software Expert

She is an electronics engineer and writer with a passion for technology. Srishti is specialized in Azure, cloud computing, and AI.