WordPress Sites Targeted via Vulnerabilities in WooCommerce Discounts Plugin

The owners and administrators of e-commerce websites powered by WordPress and the WooCommerce platform have been warned of attacks exploiting vulnerabilities discovered recently by researchers in a discounts plugin.


The flaws were identified on August 7 by researchers at web security company WebARX in Discount Rules for WooCommerce, a plugin that has been installed on over 30,000 websites and which allows users to create various types of discounts for their products. The developer patched the vulnerabilities within a week with the release of version 2.1.0.


However, it’s now important that website administrators update the plugin as WebARX says it has been seeing attacks exploiting the vulnerabilities.


The flaws have been described as SQL injection, stored cross-site scripting (XSS) and authorization-related issues. Exploitation of the stored XSS weakness can allow an unauthenticated attacker to execute arbitrary code.


WebARX told SecurityWeek that an attacker looking to exploit the vulnerabilities would first have to crawl the internet for affected WordPress websites by looking for the “woocommerce” string in their source code. Once a potential target has been found, they can send it a malicious payload.


In the attacks observed by WebARX, the cybercriminals are injecting a JavaScript file that redirects visitors to their own site, which most likely contains advertisements and malware.


“Since the issue allows the attacker to inject the payload into any template hook(s) they desire, it could be used to trigger other exploits if the site has other vulnerable plugins installed but we have not seen such payload yet,” WebARX explained. “Since HTML/JavaScript can be injected into any template hook, this could be abused to execute unwanted act ..

Support the originator by clicking the read the rest link below.