Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Exploiting WordPress Arbitrary Installation Vulnerabilities in The Wild

Posted on October 27, 2025October 27, 2025 By CWS

Menace actors have launched a major mass exploitation marketing campaign focusing on essential vulnerabilities in two well-liked WordPress plugins, GutenKit and Hunk Companion, affecting tons of of hundreds of internet sites globally.

These vulnerabilities, found in September and October 2024, have resurfaced as an lively risk in October 2025, demonstrating the persistent hazard of unpatched installations.

The assault vectors leverage improper permission checks in REST API endpoints, permitting unauthenticated attackers to put in malicious plugins and obtain distant code execution with out authentication or consumer intervention.

The GutenKit plugin, with over 40,000 lively installations, and Hunk Companion, with roughly 8,000 lively customers, signify vital assault surfaces as a result of their widespread adoption.

Wordfence Menace Response Unit analysts recognized that attackers started mass exploitation once more on October eighth, 2025, roughly one 12 months after preliminary disclosure, indicating risk actors proceed leveraging these essential flaws for large-scale compromise operations.

The Wordfence Firewall has already blocked greater than 8,755,000 exploit makes an attempt focusing on these vulnerabilities since protecting guidelines have been deployed.

The risk panorama reveals organized assault infrastructure with a number of malicious payloads designed for persistence and lateral motion.

Wordfence Menace Response Unit researchers famous that attackers distribute closely obfuscated backdoors, file managers, and webshells able to mass defacement, community reconnaissance, and terminal entry.

These malicious packages exploit the permission callback mechanism set to return true, reworking in any other case reliable plugin set up performance right into a weaponized entry level for system compromise.

REST API Permission Mechanism Exploitation

The elemental vulnerability stems from a essential misconfiguration in REST API endpoint registration. Each plugins implement permission callbacks that unconditionally allow unauthenticated requests by means of returning true values, successfully disabling entry controls solely.

In GutenKit, the weak endpoint routes to the install_and_activate_plugin_from_external() operate through the gutenkit/v1/install-active-plugin endpoint, whereas Hunk Companion exposes comparable performance by means of hc/v1/themehunk-import.

The exploitation mechanism works by sending POST requests with arbitrary plugin URLs hosted on exterior repositories, usually GitHub or attacker-controlled domains.

When an unauthenticated request reaches these endpoints, the server downloads and extracts the required ZIP archive immediately into wp-content/plugins with out validating plugin authenticity or code integrity.

Wordfence Menace Response Unit analysts found that malicious packages include obfuscated PHP scripts with All in One website positioning plugin headers to evade primary detection, alongside base64-encoded file managers and PDF-header disguised backdoors enabling full system compromise.

The set up course of executes mechanically, activating malicious code instantly and offering attackers direct command execution capabilities for putting in further malware, modifying web site content material, and establishing persistent entry mechanisms.

CVE IDPluginAffected VersionsPatched VersionCVSS ScoreVulnerability TypeBountyCVE-2024-9234GutenKit≤ 2.1.02.1.19.8 (Essential)Unauthenticated Arbitrary File Add$716.00CVE-2024-9707Hunk Companion≤ 1.8.41.9.09.8 (Essential)Lacking Authorization – Arbitrary Plugin Set up$537.00CVE-2024-11972Hunk Companion≤ 1.8.51.9.09.8 (Essential)Lacking Authorization – Plugin Set up BypassN/A

Web site directors ought to instantly replace GutenKit to model 2.1.1 and Hunk Companion to model 1.9.0. Evaluate wp-content/plugins and wp-content/improve directories for suspicious installations.

Monitor entry logs for requests to /wp-json/gutenkit/v1/install-active-plugin and /wp-json/hc/v1/themehunk-import endpoints, and implement firewall guidelines to limit API entry to authenticated customers solely.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actively, Arbitrary, Exploiting, Hackers, Installation, Vulnerabilities, Wild, WordPress

Post navigation

Previous Post: New Firefox Extensions Required to Disclose Data Collection Practices
Next Post: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens

Related Posts

Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News
New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine Cyber Security News
Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
  • iOS 26 Deletes Pegasus and Predator Spyware Infection Evidence by Overwriting The ‘shutdown.log’ file on Reboot
  • nsKnox Launches Adaptive Payment Security™, Solving the “Impossible Triangle” of B2B Fraud Prevention
  • Ubiquiti UniFi Door Access App Vulnerability Exposes API Management Without Authentication
  • X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News