SB2022091411 - Remote code execution in WPGateway plugin for WordPress



SB2022091411 - Remote code execution in WPGateway plugin for WordPress

Published: September 14, 2022

Security Bulletin ID SB2022091411
Severity
Critical
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper Authorization (CVE-ID: CVE-2022-3180)

The vulnerability allows a remote attacker to compromise the web application.

The vulnerability exists due to missing authorization checks. A remote non-authenticated attacker can send a specially crafted request to the affected plugin and add an administrative user account into your WordPress installation.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary PHP code on the server.

Note, the vulnerability is being actively exploited in the wild as of September 8.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.