Critical Vulnerabilities Found in Popular WordPress Plugins, Urgent Fixes Issued

In a significant development in the realm of website security, experts have identified critical vulnerabilities in two widely-used WordPress plugins, which could potentially impact over 4 million websites globally if not addressed. The vulnerabilities exist in the Really Simple Security (formerly Really Simple SSL) plugin and the WPLMS Learning Management System plugin, both of which have a substantial user base. With a high CVSS score of 9.8, these security flaws pose severe risks, including the possibility of attackers gaining full administrative access and executing arbitrary code. The urgency of addressing these issues cannot be overstated, as failure to do so could result in widespread site hijacks and other criminal activities.

Really Simple Security Plugin Vulnerability

The first significant vulnerability has been discovered in the Really Simple Security plugin, affecting versions 9.0.0 to 9.1.1.1. This flaw has been labeled as CVE-2024-10924 and stemmed from improper user check error handling within the function known as "check_login_and_get_user." When this function fails to properly verify user identities, it allows unauthenticated attackers to log in as arbitrary users, including administrators, especially when two-factor authentication is enabled. This vulnerability significantly escalates the risk of unauthorized site hijacking and criminal misuse, as attackers could potentially take control of both the website and its content.

Upon discovery, the vulnerability was responsibly disclosed on November 6, 2024. Within a week, the plugin’s maintainers collaborated with WordPress to release a patched version, 9.1.2, on November 13, 2024. Given the critical nature of the vulnerability and its potential impact on millions of sites, WordPress took the extraordinary step of enforcing automatic updates for affected sites before the public disclosure. This proactive measure ensured that most websites were secured against potential exploitation. Website administrators who use the Really Simple Security plugin should immediately verify that their sites are running the latest version to maintain security integrity.

WPLMS Learning Management System Vulnerability

The second critical vulnerability has been found in the WPLMS Learning Management System plugin, which also has a large user base. Similar to the previous plugin, this vulnerability carries a CVSS score of 9.8, indicating severe risk. The security flaw could allow attackers to gain full control over the affected websites and execute arbitrary code. Given its critical nature, addressing this vulnerability is of the utmost importance to prevent potential site hijacks and other criminal activities. Website administrators using the WPLMS Learning Management System plugin are strongly advised to update to the latest version immediately to ensure their sites remain secure.

Explore more