Connect with us

News

Millions of WordPress Sites Under Attack Through Old Plugin Flaws

Published

on

A massive hacking campaign is sweeping across WordPress sites, exploiting long-fixed flaws in two popular plugins, GutenKit and Hunk Companion, to gain full control of websites. Security experts warn that millions of sites could be at risk if administrators fail to update outdated versions.

Hackers Exploit Critical WordPress Plugin Vulnerabilities

WordPress security company Wordfence revealed that it blocked 8.7 million attack attempts in just 48 hours, between October 8 and 9, targeting websites using vulnerable versions of GutenKit and Hunk Companion.

The attacks take advantage of three critical vulnerabilities — CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972 — all carrying a CVSS score of 9.8, which is near the maximum severity rating.

  • CVE-2024-9234 affects GutenKit versions 2.1.0 and earlier, exposing an unauthenticated REST endpoint that lets attackers install arbitrary plugins without any login.

  • CVE-2024-9707 and CVE-2024-11972 impact Hunk Companion versions 1.8.5 and older, with missing authorization checks in the “themehunk-import” REST endpoint that can also allow rogue plugin installation.

This combination of flaws lets hackers quietly add malicious plugins, opening the door for remote code execution (RCE), full website takeovers, and data theft.

Hackers launch massive attacks on WordPress

How the Attack Campaign Works

Wordfence researchers observed that the attackers are using GitHub to host a malicious plugin archive named “up.zip”. The file contains heavily obfuscated scripts designed to upload, download, and delete files, or even modify server permissions.

One of the malicious scripts, disguised as part of the All in One SEO plugin, uses a password-protected function to log the hacker in as an administrator. Once inside, attackers can steal sensitive data, upload new backdoors, or maintain long-term access to the infected system.

If the initial exploit does not grant full admin privileges, attackers often install another plugin, wp-query-console, which itself has known vulnerabilities that can be exploited to execute code without authentication.

The entire attack chain is engineered for persistence, flexibility, and stealth.

Old Flaws, New Victims

Although the developers fixed these flaws months ago — GutenKit 2.1.1 in October 2024 and Hunk Companion 1.9.0 in December 2024 — many websites still use outdated versions.

WordPress statistics show that tens of thousands of websites continue to run older plugin releases, leaving them open to compromise. GutenKit alone has around 40,000 active installations, while Hunk Companion is used on about 8,000 sites.

This highlights a persistent challenge in WordPress security: site owners often delay or ignore plugin updates, giving hackers a window of opportunity long after patches are available.

Plugin NameVulnerability IDAffected VersionsPatched VersionType of FlawActive Installs
GutenKitCVE-2024-92342.1.0 and earlier2.1.1Unauthenticated REST Endpoint40,000
Hunk CompanionCVE-2024-97071.8.4 and older1.9.0Missing Authorization8,000
Hunk CompanionCVE-2024-119721.8.5 and earlier1.9.0Missing Authorization8,000

Signs of Compromise Website Owners Should Check

Security researchers shared clear indicators of compromise (IoCs) that administrators can look for to determine if their sites were targeted.

Admins should scan access logs for the following suspicious REST API requests:

  • /wp-json/gutenkit/v1/install-active-plugin

  • /wp-json/hc/v1/themehunk-import

Additionally, site owners are advised to check for rogue directories that might indicate successful breaches:

  • /up

  • /background-image-cropper

  • /ultra-seo-processor-wp

  • /oke

  • /wp-query-console

If any of these entries are found, administrators should immediately remove the malicious files, reset all credentials, and update plugins to their latest versions.

How Website Owners Can Stay Protected

Experts emphasize that regular plugin maintenance is the best defense against such mass exploitation campaigns.

To strengthen WordPress security, administrators should:

  • Always keep plugins, themes, and the WordPress core updated.

  • Use a web application firewall (WAF) or security service to block malicious requests.

  • Limit plugin installations only to trusted, verified sources.

  • Perform periodic scans to detect unauthorized files or changes.

Wordfence’s data shows that attack traffic often originates from specific IP addresses known for malicious behavior. Blocking these IPs or deploying an updated firewall rule set can help mitigate risks.

Neglecting updates on WordPress sites is like leaving the front door open — attackers will find a way in.

The campaign illustrates how cybercriminals increasingly target small and medium-sized website owners who rely on outdated security practices, making them easy prey for automated attack tools.

A Growing Problem for WordPress Security

WordPress powers over 43% of all websites on the internet, making it the most popular content management system but also the most targeted. Attackers favor it for its large ecosystem of third-party plugins, which often become weak points when not maintained properly.

Security analysts note that the increasing automation of hacking tools allows criminals to scan and attack thousands of websites within hours, leveraging even year-old vulnerabilities like these.

The current campaign serves as another reminder that patch management is not optional. As one researcher put it, “Attackers don’t need zero-days when site owners don’t apply the patches.”

Website security is no longer a one-time setup — it’s a continuous responsibility.

Stephon Brody is a writer who is good at movies, sports, technology, and health related articles. He is passionate about sharing his knowledge and opinions on various topics that interest him and his audience. He is a creative and reliable writer who can deliver engaging and informative articles to his readers.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING