Exploits detected in the Ninja Forms plugin for WordPress, installed on more than 'a million sites, can lead to a complete takeover of the site if left unchecked.
Wordfence has detected a total of four vulnerabilities in Ninja Forms WordPress plugin that could allow attackers from:
- Redirect site administrators to random locations.
- Install a plugin that could be used to intercept all mail traffic.
- Get the Ninja Form OAuth connection key used to establish a connection with the tNinja Forms central management panel.
- Trigger site administrators to take an action that could disconnect the OAuth connection from a site.
These vulnerabilities could cause attackers to take control of a site and perform any number of malicious actions.
Due to the seriousness of the exploits, an immediate plugin update is recommended. Since February 8, all vulnerabilities are corrected in version 126.96.36.199 of the Ninja Forms plugin.
Ninja Forms is a popular plugin that allows site owners to create contact forms using a simple drag and drop interface.
It currently has over one million active installations. If you have a contact form on your site and you don't know what plugin it's built with, it's worth checking out if you're using Ninja Forms.
A quick update of the plugin will protect your site from all of the vulnerabilities listed above.
The speed at which these vulnerabilities were patched shows just how determined the developers of the plugin are to protect it.
Wordfence reports that it created the Ninja Forms developers became aware of the vulnerabilities on January 20, and they were all fixed on February 8.
Exploits of vulnerability - The third biggest threat to WordPress sites
Vulnerability exploits are a significant threat to WordPress sites. It is important to regularly update your plugins in order to have the latest security patches.
A report released last month lists vulnerabilities exploited as third among the top 3 threats to WordPress sites.
In total, 4.3 billion vulnerability exploitation attempts were made on over 9.7 million IP addresses unique in 2020.
This is such a common attack that out of 4 million sites analyzed in the report, each of them has experienced at least one attempted vulnerability exploitation. 'last year.
Adding a firewall to your WordPress site is another way to protect it, as it can prevent attackers from abusing plugin vulnerabilities even if they don't. 'have not yet been fixed.
When adding a new plugin to your site, it is a good practice to check when it was last updated. It is a good sign when the plugins have been updated in the last few weeks or months.
Abandoned plugins pose a greater threat to sites as they may contain vulnerabilitiesuncorrected.
For more tips on keeping your site secure, see: How to protect a WordPress site from hackers .
Avoid Pirated Plugins
Avoid using pirated versions of paid plugins at all costs, as they are the source of the most widespread WordPress security threat.
Malware from pirated themes and plugins is the main threat to WordPress sites. Over 17% of all infected sites in 2020 contained malware from a hacked plugin or theme.
Until recently it was possible to download pirated plugins from official WordPress repositories, but as of this week they have has been deleted .