WordPress Security Vulnerability Leads To 1.5 Million Web Pages Being Defaced

Cyber attacks on WordPress sites that exploit a vulnerability in the REST application programing interface (API) have intensified leading to 1.5 million pages being defaced across 39,000 unique domains.

The flaw has been patched in the 4.7.2 version of WordPress, according to the Beeping Commuter, but despite this the exploit has been tapped into by 20 malicious hacker groups engaging in a web page defacement turf war.

Defacement debacle

Researchers from Securi Security first discovered the flaw in the widely-used content management system, which the WordPress team kept secret for a week due to the high-risk of the flaw. They later revealed that security hole with the release of WordPress 4.7.2.

But given the speed at which hackers can move to exploit security flaws, they rapidly found that they could attack unpatched WordPress sites through crafting simple HTTP requests that allow them to bypass authentication systems on WordPress sites and then edit the content ant titles of web pages using the versions 4.7.0 and 4.7.1 of WordPress.

As such, there has been a sharp increase in attacks and WordPress site defacement, presumably due to hacker groups competing with each other for bragging rights, as well as defacing sites already attacked by one group.

However, Daniel Cid, founder of Sucuri Security warned that that defacements are just the beginning to the activates of hackers exploiting unpatched WordPress sites.

“Defacements don’t offer economic returns, so that will likely die soon. What will remain are attempts to execute commands (RCE) as it gives the attackers full control of a site – and offers multiple ways to monetize – and SPAM SEO / affiliate link / ad injections,” he explained.

“We are starting to see them being attempted on a few sites, and that will likely be the direction this vulnerability will be misused in the coming days, weeks and possibly months.”

While security issues are not uncommon in WordPress sites, the website company is attempting to make the sites of its user more secure by offering custom domains free upgrade to the HTTPS web protocol.

Earlier this week it emerged security firm Trend Micro had fallen victim to a content spoofing vulnerability on its customer-facing blog.

Are you a security expert? Try our quiz!

Roland Moore-Colyer

As News Editor of Silicon UK, Roland keeps a keen eye on the daily tech news coverage for the site, while also focusing on stories around cyber security, public sector IT, innovation, AI, and gadgets.

Recent Posts

AMD Warns Of $800m Charge From US Chip Restrictions On China

Another big name chip maker expects a hefty financial charge, after the US tightened rules…

5 mins ago

Google Digital Ad Network Ruled Illegal Monopoly By Judge

More bad news for Google. Second time in less than a year that some part…

17 hours ago

US State Dept Closes Office Flagging Russia, China Disinformation

Federal office that tackled misinformation and disinformation from hostile nations is closed down, after criticism…

18 hours ago

Nvidia CEO Jensen Huang Makes Surprise Visit To China

After Nvidia admits it will take $5.5 billion charge as Trump export limits of slower…

19 hours ago

Former CISA Chief Chris Krebs Targetted By Trump Executive Order

Trump continues to target his former CISA head, signing a new executive order targetting Chris…

20 hours ago

Temu, Shein To Increase US Prices After Trump’s Tariffs

Two Chinese retailers warn customers in America that prices will increase next week, as Trump's…

23 hours ago