wpuser_X Administrator Exploit / Hack in WordPress PublishPress Capabilities Plugin

Security challenges appear all the way and the latest hackers are exploiting a vulnerability in a wordpress plugin Which culminate, is designed to limit users' access to WordPress capabilities and better control their permissions.

If you have a blog, online store, presentation site running WordPress and the module PublishPress Capabilities, it is good to check if not in DashboardUsersAll UsersAdministrator, nu apar si utilizatori pe care nu-i cunoasteti si de cele mai multe ori cu nume de formawpuser_sdjf94fsld“.

wpuser_ Hack WordPress
wpuser_ in Administrator

I met this hack on several online stores and I quickly concluded that their only common element is plugin PublishPress Capabilities, which presents a vulnerability that allows the add of a user with administrator's rank, without the need for a standard recording process.

On some affected WordPress sites, the attackers were satisfied only to add the new users with the rank of administrator, without breaking. Or maybe they didn't have time.
On others instead they have been made redirectionari ale WordPress Address (URL) and / or Site Address (URL) to external pages and most likely viruses. Sign that those who launched these attacks had little mind. This is the best part of this security problem.
Of course, there is no pleasure to wake up that the online store, the website or the blog are redirected to other web addresses, but the good part is that the mummant who took control, did not do other damage. Gen, to delete content, inject spam links throughout the database and other crazy. I don't want to give ideas.

How do we solve the security problem if we were affected by WPUSER_ exploit on WordPress?

Luam scenariul in care blogul WordPress a fost afectat de hack-ulwpuser_si redirectionat catre o alta adresa web. Deci clar nu mai puteti sa va autentificati si sa ajungeti in Dashboard.

1. We connect to the database of the affected site. Via phpmyadmin or what management path does each have. Database authentication data is located in the file wp-config.php.

define('DB_USER', 'user_blog');
define('DB_PASSWORD', 'passworddb');

2. We go in “wp_optionsiar pe coloanaoptons_valuene asiguram ca este adresa corecta a site-ului nostru lasiteurl” and “home“.

From here the redirection to another address is practically done. After changing with the website address, it can be accessed again.

3. Tot inwp_optionsverificam ca adresa de mail admin sa nu fi fost si ea modificata. Verificam laadmin_emailsa fie cea corecta. Daca nu este cea corecta, o modificam si trecem adresa legitima. Aici am gasitadmin@example.com“.

4. We go to Dashboard and update urgently to the plugin PublishPress Capabilities Or we deactivate and delete it from the server.

5. In DashboardUsersAll UsersAdministrator We delete illegitimate users with the rank of administrator.

6. We change the passwords of the legitimate users with administrator rights and the password of the database.

It is advisable to install and configure a security module. Wordfence Security Provides sufficient protection in the free version, for such attacks.

I didn't stay too long where exactly was the vulnerability in PublishPress Capabilities, but if you have Virusat the site with this exploit can help you get rid of it. The comments are open.

Passionate about technology, I write with pleasure on stealthsetts.com starting with 2006. I have a rich experience in operating systems: Macos, Windows and Linux, but also in programming languages ​​and blogging platforms (WordPress) and for online stores (WooCommerce, Magento, Presashop).

Home Your source of IT tutorials, useful tips and news. wpuser_X Administrator Exploit / Hack in WordPress PublishPress Capabilities Plugin

1 thought on “wpuser_X Administrator Exploit / Hack in WordPress PublishPress Capabilities Plugin”

Leave a Comment