{"id":29251,"date":"2023-04-02T10:33:26","date_gmt":"2023-04-02T08:33:26","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=29251"},"modified":"2023-04-02T10:33:26","modified_gmt":"2023-04-02T08:33:26","slug":"hackers-attack-wordpress-via-unpatched-elementor-pro-plugin","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/04\/02\/hackers-attack-wordpress-via-unpatched-elementor-pro-plugin\/","title":{"rendered":"Hackers attack WordPress via unpatched Elementor Pro plugin"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2014\/07\/wp_thumb.jpg\" alt=\"\" width=\"64\" height=\"64\" align=\"left\" \/>WordPress administrators using the Elementor Pro plugin should urgently check if it is up to date and if WordPress has already been compromised (e.g. check <a href=\"https:\/\/urlscan.io\/\" target=\"_blank\" rel=\"noopener\">urlscan.io<\/a> to see what connections are going down). On March 18, 2023, NinTechNet security researcher Jerome Bruandet had discovered a vulnerability that can be exploited if the plugin is installed together with WooCommerce. Hackers are now actively exploiting the highly dangerous vulnerability in WordPress plugin Elementor Pro. The plugin for creating WordPress pages is used by over eleven million websites. Details have been summarized by the colleagues from <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-bug-in-elementor-pro-wordpress-plugin-with-11m-installs\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer here<\/a> (thanks to the reader's tip).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WordPress administrators using the Elementor Pro plugin should urgently check if it is up to date and if WordPress has already been compromised (e.g. check urlscan.io to see what connections are going down). On March 18, 2023, NinTechNet security researcher &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/04\/02\/hackers-attack-wordpress-via-unpatched-elementor-pro-plugin\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[2656,359],"class_list":["post-29251","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-securtiy","tag-wordpress"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=29251"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/29251\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=29251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=29251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=29251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}