/*! elementor-pro - v3.26.0 - 17-12-2024 */ (()=>{"use strict";class Screenshot extends elementorModules.ViewModule{getDefaultSettings(){return{empty_content_headline:"Empty Content.",crop:{width:1200,height:1500},excluded_external_css_urls:["https://kit-pro.fontawesome.com"],external_images_urls:["https://i.ytimg.com"],timeout:15e3,render_timeout:5e3,timerLabel:null,timer_label:`${ElementorScreenshotConfig.post_id} - timer`,image_placeholder:"data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=",isDebug:elementorCommonConfig.isElementorDebug,isDebugSvg:!1,...ElementorScreenshotConfig}}getDefaultElements(){const e=jQuery(ElementorScreenshotConfig.selector),t=e.find(".elementor-section-wrap > .elementor-section, .elementor > .elementor-section");return{$elementor:e,$sections:t,$firstSection:t.first(),$notElementorElements:elementorCommon.elements.$body.find("> *:not(style, link)").not(e),$head:jQuery("head")}}onInit(){return super.onInit(),this.log("Screenshot init","time"),this.timeoutTimer=setTimeout(this.screenshotFailed.bind(this),this.getSettings("timeout")),this.captureScreenshot()}captureScreenshot(){return this.elements.$elementor.length||(elementorCommon.helpers.consoleWarn("Screenshots: The content of this page is empty, the module will create a fake conent just for this screenshot."),this.createFakeContent()),this.removeUnnecessaryElements(),this.handleIFrames(),this.removeFirstSectionMargin(),this.handleLinks(),this.loadExternalCss(),this.loadExternalImages(),Promise.resolve().then(this.createImage.bind(this)).then(this.createImageElement.bind(this)).then(this.cropCanvas.bind(this)).then(this.save.bind(this)).then(this.screenshotSucceed.bind(this)).catch(this.screenshotFailed.bind(this))}createFakeContent(){this.elements.$elementor=jQuery("
The post WordPress Hunk Companion Plugin Exploited to Stealthily Install Risky Plugins appeared first on The Tach.
]]>WordPress Hunk Companion Plugin was intended to boost the features of themes created by ThemeHunk. These themes are quite flexible and if you can install them, you are ready to roll, whether a small business, flying solo, or even a blogger. Though this plugin depends more on Hunk themes, it has become a handy tool for many WordPress users. At present, it is used on more than10,0000 sites. Even though it enjoys this level of popularity and is used on only about 7% of websites, it has not been immune to attackers seeking to capture any loophole that can be used to attack WordPress.
The critical CVE-2024-11972 vulnerability allows attackers to execute unauthenticated plugin installations using specially crafted POST requests. Hackers exploit this flaw to bypass administrative controls and directly install plugins with known security flaws. Discovered by WPScan researcher Daniel Rodriguez, this vulnerability impacts all versions of the WordPress Hunk Companion Plugin released before version 1.9.0. The latest version, which was released as a security update, addresses this critical issue and is strongly recommended for all users.
Cybercriminals exploiting the Hunk Companion security flaw have been observed installing outdated plugins like WP Query Console. This precise plugin has such nasty outdated flaws that a hacker can easily gain code execution (RCE) and more. The critical CVE-2024-11972 vulnerability is exploited to upload two PHP scripts to the victim sites. AThesescripts can be useful for such purposes as stealing data, modifying the contents, exploiting the loopholes, and making a persistent wrench to perform attacks in the future. This problem is a clear indication that a call for action and measures should be taken by website owners as soon as possible.
During their investigations, WPScan researchers documented active exploitation of the Hunk Companion security flaw. On an infected WordPress site, hackers installed risky plugins and placed malicious scripts in the root directory. These scripts enabled attackers to execute commands remotely, allowing continuous control over the compromised site. The presence of PHP droppers, which facilitate repeated unauthorized access, was particularly alarming. Similar techniques have used in other high-profile WordPress attacks, underscoring the sophistication of today’s cyber threats.
The WordPress Hunk Companion Plugin has faced security issues in the past. An earlier vulnerability has found in version 1.8.5 and termed as CVE-2024-9707. A patch made available, but later, the attackers able to circumvent it and again make the sites all exposed. These recurring vulnerabilities highlight the importance of robust security practices during plugin development. Developers must implement rigorous testing and frequent updates to mitigate risks and protect users.
There are several things to note regarding the Hunk Companion security vulnerability To put it in context, the release of version 1.9.0 has given a new direction in dealing with the problem. The targeted plugins are reported to in continuous use, and users are encouraged to update them to prevent further abuse on their websites.
However, the take-up of this release relatively subdued, with less than 20% of users having installed the update. This delay in rolling out updates experienced extensively amongst WordPress users. Many users fail to recognize the urgency of security updates, leaving their websites exposed to serious threats. Website owners must prioritize regular updates to maintain robust WordPress website security.
To safeguard against similar vulnerabilities and improve overall WordPress website security, consider the following best practices: Do not allow yourself to exploited by failing to update all tools to the latest version. Use reputable security plugins: There is protection and monitoring software available on the market, such as Wordfence and Sucuri. Limit plugin usage: In this context, you should install only the plugins that get updates and updates frequently and that you need. Enable two-factor authentication (2FA): Place an additional security measure on the admin page login. Monitor website activity: Perform scheduled check-ups to look for modifications that made without one’s knowledge, or abnormal behavior.
Failing to address vulnerabilities like the Hunk Companion security flaw can lead to severe consequences. These include Loss of sensitive data: Hackers can steal customer information or business records. Business disruption: Website downtime caused by attacks can result in lost revenue. Reputation damage: A hacked website erodes user trust and credibility. Legal implications: They pave the way to litigation or regulatory penalties. Such risks explain why one needs to take preventive measures to safeguard websites from other formidable threats.
The attack on the WordPress Hunk Companion Plugin with the critical CVE-2024-11972 vulnerability is a good example of how dangerous the situation with website security is. Website owners have to be proactive in their approach and constantly learn how to adapt the plugins they use or modify for appropriate security measures as well as keep abreast with any risks. The risks are high: over 8,000 websites remain exposed. Measures should taken before the attacker continues further with the exploitation. And before the site owner or administrator protected against subsequent attacks. It is up to both developers and users to pay more attention to security in the current world of technology.
The plugin enhances Hunk themes, offering additional features and functionality.
This flaw allows unauthorized plugin installations via POST requests, compromising websites.
Hackers exploit known vulnerabilities in outdated plugins to execute malicious commands.
Regular updates, security plugins, and two-factor authentication strengthen website defenses.
The post WordPress Hunk Companion Plugin Exploited to Stealthily Install Risky Plugins appeared first on The Tach.
]]>