Original Article Text

Click to Toggle View

W3 Total Cache plugin flaw exposes 1 million WordPress sites to attacks. A severe flaw in the W3 Total Cache plugin installed on more than one million WordPress sites could give attackers access to various information, including metadata on cloud-based apps. The W3 Total Cache plugin uses multiple caching techniques to optimize a website's speed, reduce load times, and generally improve its SEO ranking. The flaw is tracked as CVE-2024-12365 despite the developer releasing a fix in the latest version of the product, hundreds of thousands of websites have still to install the patched variant. Vulnerability details Wordfence notes that the security issue is due to a missing capability check in the ‘is_w3tc_admin_page’ function in all versions up to the latest one, 2.8.2. This fault allows access to the plugin's security nonce value and perform unauthorized actions. Exploiting the vulnerability is possible if the attacker is authenticated and has at least subscriber-level, a condition that is easily met. The main risks that arise from the exploitation of CVE-2024-12365 are: Regarding the real-world impact of this flaw, attackers could use the website’s infrastructure to proxy requests to other services and use the collected information to stage further attacks. The best action for impacted users is to take is to upgrade to the latest version of W3 Total Cache version, 2.8.2, which addresses the vulnerability. Download statistics from wordpress.org indicate that roughly 150,000 websites installed the plugin after the developer released the most recent update, leaving hundreds of thousands of WordPress sites still vulnerable. As a general recommendations, website owners should avoid installing too many plugins and discard the products that are not absolutely necessary. Additionally, a web application firewall could prove beneficial as it could identify and block exploitation attempts.

Daily Brief Summary

MALWARE // Critical Security Flaw in W3 Total Cache Affects Over a Million Sites

A significant vulnerability in the W3 Total Cache WordPress plugin, affecting over one million sites, allows unauthorized information access.

Tracked as CVE-2024-12365, the flaw was identified in the plugin's function that lacks proper security checks, enabling exploitation even by low-level subscribers.

Attackers can manipulate the site’s infrastructure to forge proxy requests and gather data for further cyber attacks.

Although a patch is available in version 2.8.2 of W3 Total Cache, a large number of sites have not updated, leaving them vulnerable.

About 150,000 websites upgraded after the patched version was released, with several hundred thousand still at risk.

Website owners are advised to install updates immediately and reduce the number of plugins to enhance security.

Implementing a web application firewall is recommended to detect and block potential exploit attempts.