10k+ websites at risk due to WordPress plugin vulnerability

April 24, 2024
1 min read

TLDR:

  • A critical vulnerability in the WP Datepicker WordPress plugin has been identified, affecting over 10,000 active installations.
  • The vulnerability, known as CVE-2024-3895, allows authenticated attackers with subscriber-level access and above to update arbitrary options, posing a risk of privilege escalation.

A critical vulnerability in the WP Datepicker WordPress plugin has been discovered, impacting over 10,000 active installations. The vulnerability, named CVE-2024-3895, has been assigned a high severity level with a CVSS score of 8.8. This vulnerability, known as an Arbitrary Options Update Vulnerability, could be exploited by authenticated attackers with subscriber-level access and above to update arbitrary options, potentially leading to privilege escalation. This could enable threat actors to create administrator accounts, posing a significant risk to affected websites.

The flaw was found in versions 2.1.0 and earlier of the WP Datepicker plugin, and has been fully addressed in the latest version, 2.1.1. The researcher who discovered and reported the vulnerability through the Wordfence Bug Bounty Program was awarded a bounty of $493.00. Wordfence has issued a firewall rule to protect against exploits targeting this vulnerability, and WordPress users are strongly encouraged to update their sites to the latest patched version of the plugin (2.1.1 or higher) to prevent potential cyber attacks.

Overall, this vulnerability highlights the importance of timely updates and security measures to safeguard websites against potential cyber threats and attacks.

Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and