News Software 03-11-2024 at 16:23 comment views icon

Hackers exploit Popup Builder WordPress plugin vulnerability to infect 3300 websites

author avatar
https://itc.ua/wp-content/uploads/2023/07/2023-07-19-12.08.01-2-96x96.jpg *** https://itc.ua/wp-content/uploads/2023/07/2023-07-19-12.08.01-2-96x96.jpg *** https://itc.ua/wp-content/uploads/2023/07/2023-07-19-12.08.01-2-96x96.jpg

Yurii Oros

News writer

Hackers exploit Popup Builder WordPress plugin vulnerability to infect 3300 websites

Hackers have been hacking WordPress sites by exploiting a vulnerability in outdated versions of the Popup Builder plugin, infecting more than 3,300 sites with malicious code.

The vulnerability used in the attacks is tracked as CVE-2023-6000 — a cross-site scripting (XSS) vulnerability affecting Popup Builder versions 4.2.3 and earlier that was first discovered in November 2023.

The Balada Injector campaign discovered earlier this year exploited this vulnerability to infect more than 6,700 sites, suggesting that many site administrators did not install the patches quickly enough. Now, a new campaign is targeting the same vulnerability in a WordPress plugin. According to PublicWWW, code injections related to this latest campaign can be found on 3329 WordPress sites in the last three weeks.

The attacks infect the Custom JavaScript or Custom CSS sections of the WordPress administrative interface, and the malicious code is stored in the ‘wp_postmeta’ database table.

The main function of the injected code is to act as event handlers for the Popup Builder plugin, such as “sgpb-ShouldOpen”, “sgpb-ShouldClose”, “sgpb-WillOpen”, “sgpbDidOpen”, “sgpbWillClose” and “sgpb-DidClose”. Malicious code is launched when certain plugin actions occur, for example, when a pop-up window is opened or closed.

The specific actions of the code may vary, but the main purpose of injections is to redirect visitors to infected sites to malicious addresses, such as phishing pages and malware sites.

In particular, in some infections, analysts observed the code injecting a redirect URL (hxxp://ttincoming.traveltraffic[.]cc/?traffic) as a redirect-url parameter for the “contact-form-7” pop-up.

Hackers exploit Popup Builder WordPress plugin vulnerability to infect 3300 websites

In practice, attackers can achieve a number of goals with this method, many of which are potentially more serious than redirects. If you’re using the Popup Builder plugin on your site, update it to the latest version, currently 4.2.7, which addresses CVE-2023-6000 and other security issues.


Loading comments...

Spelling error report

The following text will be sent to our editors: