Description
Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47415 | Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator users and send that data back to a server. Currently, not all plugins have been patched and we strongly recommend uninstalling the plugins for the time being and running a complete malware scan. |
References
History
No history.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:33:05.337Z
Reserved: 2024-06-25T03:30:37.338Z
Link: CVE-2024-6297
Updated: 2024-08-01T21:33:05.337Z
Status : Deferred
Published: 2024-06-25T04:15:17.400
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6297
No data.
OpenCVE Enrichment
Updated: 2025-07-14T23:06:24Z
Weaknesses
No weakness.
EUVD