Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

XSS Remains as the Most Vulnerability Exploited

admin by admin
Apr 2, 2024
in News
A A
0

Of all the security flaws discovered in the WordPress ecosystem, cross-site scripting (XSS) vulnerabilities accounted for about 53.3% of the total.

As of last year, XSS accounted for 27% of all security vulnerabilities, a significantly higher rate than in 2022.

Cross-site scripting (XSS) is a security flaw in which an attacker can insert malicious code into a website.

After that, the malicious code can be used to do undesirable acts like redirect traffic or steal confidential data, which could provide the attacker with control over a website.

C:UserswelcomeAppDataLocalPackagesMicrosoft.Windows.Photos_8wekyb3d8bbweTempStateShareServiceTempFolderCross-Site-Scripting-XSS-was-the-most-common-vulnerability-in-WordPress-in-2023.jpeg
XSS – The most common vulnerability in WordPress in 2023

Why is XSS the Most Common Kind of Vulnerability?

According to the PatchStack Security report, a flaw in the Freemius framework, a third-party managed eCommerce platform, was the source of a significant number of CSRF vulnerabilities in 2022.

Document

Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .


The framework’s widespread use meant that it affected a large number of plugins.

Of those XSS vulnerabilities, researchers can trace more than 1,200 of them back to Freemius.

“This year we saw once again how a single cross-site scripting vulnerability in the Freemius framework resulted in 1,248 plugins inheriting the security vulnerability, exposing their users to risk”, the report said.

“21% of all new vulnerabilities discovered in 2023 can be traced back to this one flaw.

Developers need to choose their stack carefully and promptly apply security updates when these become available.”

Additionally, 42.9% of newly discovered vulnerabilities have a severity level of high or critical overall.

The proportion of vulnerabilities with high and critical severity is much larger than it was in 2022. 56.6% of vulnerabilities this year were categorized as “only” medium severity concerns, compared to 84% last year.

42.9% of newly discovered vulnerabilities have a severity level of high or critical overall
42.9% of newly discovered vulnerabilities have a severity level of high or critical overall

A high risk of 13.6% of newly discovered vulnerabilities necessitated quick action. 34.7% had a “Medium” priority level, which means that while they might be used in targeted attacks, they were severe enough to receive a virtual patch.

“Looking at all new security vulnerabilities found in 2023, 58.9% did not require any authentication to be exploited.

These vulnerabilities are inherently more dangerous because they can be exploited automatically and en masse”, researchers said.

On the other hand, 13.4% of the newly discovered vulnerabilities could only be exploited with the administrator role.

The Increase of Abandoned Plugins

The high number of abandoned plugins is another important source of vulnerabilities.

However, 827 plugins and themes in all were submitted to the WordPress team in 2023.

After that, 481 susceptible components were abandoned and taken out of the plugin repository.

To raise awareness of the “zombie plugin pandemic” in WordPress, researchers reported 404 of those plugins in a single day.

These “zombie” plugins are parts that, while first appearing secure and up-to-date may have unpatched security flaws.

Well-Known Plugins with Reported Security Flaws
Well-Known Plugins with Reported Security Flaws

Top 5 Newly Discovered Vulnerabilities with the Most Attempted Exploits

  • tagDiv Composer plugin – Unauthenticated Stored XSS vulnerability
  • WooCommerce Payments plugin – Unauthenticated privilege escalation vulnerability
  • Ultimate Member plugin– Unauthenticated Privilege Escalation
  • Essential Addons for Elementor plugin– Unauthenticated Privilege Escalation
  • HT Mega Absolute Addons for Elementor plugin– Unauthenticated Privilege Escalation

Still, the rise does not indicate a deteriorating security scenario inside the WordPress platform.

Instead, it demonstrates that security is a higher priority for both plugin producers and security researchers.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.