50,000 sites hit by MailPoet WordPress plug-in security flaw
Users of blogging platform's newsletter plug-in told to upgrade extension ASAP
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Users of the popular MailPoet WordPress plug-in are being urged to update it, following the discovery of a vulnerability that has so far led to 50,000 websites becoming compromised.
The newsletter plugin contains a security vulnerability, which was first flagged by security researchers at the start of July, that allows hackers to remotely upload files to a website without obtaining authentication first.
A new version of MailPoet was released on the same day the researchers published a blog post on it, but it seems news of its arrival has not reached all users, as many are still using unpatched versions.
To date, the plug-in has been downloaded around 1.7 million times and, when the original blog post was published, it was unclear if the vulnerability had been exploited.
Now, the same researchers from security firm Sucuri have confirmed that thousands of Wordpress websites have been attacked, with hackers seizing on the MailPoet vulnerability to inject malware into them.
The malicious software has been found to corrupt numerous WordPress files, resulting in PHP error messages appearing on peoples' sites.
However, it's not just websites that have the MailPoet extension installed that are being affected, the researchers have warned.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"The MailPoet vulnerability is the entry point, it doesn't mean your website has to have it enabled or that you have it on your website; if it resides on the server, in a neighbouring website, it can still affect your website," the blog post states.
Those who do have the plug-in installed are being urged to upgrade it to the latest version now to prevent it from spreading further.
-
Cohere's Aleph Alpha merger could create a transatlantic sovereign AI powerhouseAnalysis The merger between Cohere and Aleph Alpha aims to capitalize on the burgeoning sovereign AI market
-
Everything you need to know about OpenAI's new workspace agentsNews New ‘workspace agents’ from OpenAI will automate tasks for workers and can be customized for specific roles
-
Brace yourselves for a vulnerability explosion, Forescout warnsNews AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think
-
Ubuntu vulnerability exposes enterprises to root escalation, complete system compromiseNews The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.