Critical bug in WordPress plugin could allow hackers to wipe entire sites

(Image credit: Pixabay)

Security researchers at WebARX have discovered a critical bug in a popular WordPress plugin that could allow unauthenticated users to gain administrative privileges and restore a site's entire database to its default state if left unpatched.

The vulnerability was found in the ThemeGrill Demo Importer plugin that ships with WordPress themes sold by the web development company ThemeGrill. 

The plugin is installed on over 200,000 sites and it allows site owners to import demo content in to their ThemeGrill themes to provide them with examples which they can use to build their own sites.

According to a new report from WebARX, versions 1.3.4 to 1.6.1 of the ThemeGrill Demo Importer plugin are vulnerable to the bug which could allow unauthenticated hackers to launch remote attacks on WordPress sites that have the plugin installed.

Remote attacks

Hackers can exploit the vulnerability in ThemeGrill Demo Importer by sending a specially crafted payload to sites that have an older version of the plugin installed to trigger a function inside the plugin.

This function can be used to wipe the database of a WordPress site where a ThemeGrill theme is active and the vulnerable plugin is installed. Additionally, if the site's database contains a user named “admin”, then the attacker is granted access to that user along with full administrator rights over the site.

Researchers at WebARX first discovered the vulnerability earlier this month and quickly reported their findings to ThemeGrill. The company has since released a new version of ThemeGrill Demo Importer which fixes the bug.

However, at the time of writing, the latest version of the plugin, version 1.6.3, has been installed over 100,000 times which means that many users have yet to update their sites. If you have the ThemeGrill Demo Importer plugin installed on your site, it is highly recommended that you update it immediately to prevent falling victim to any attacks that exploit the vulnerability present in earlier versions.

Via ZDNet

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does
iPhone 13 mini
The iPhone mini won't be returning, according to rumors – and you think that's a mistake