Description Preview
Overview
This vulnerability (CVE-2021-38314) affects over 1 million WordPress sites using the Redux Framework plugin version 4.2.11 or earlier. The issue stems from predictable AJAX action names that allow unauthenticated users to access sensitive site information. The vulnerability is classified as CWE-916 (Use of Password Hash With Insufficient Computational Effort), indicating that the hashing mechanism used to "protect" these AJAX actions was inadequate. An attacker can exploit this vulnerability to gather information about the site's configuration, which could be used to identify other potential vulnerabilities or plan more targeted attacks. The exposed information includes active plugins and their versions, PHP version, and hashed authentication keys.
Remediation
To remediate this vulnerability, site administrators should:
- Update the Gutenberg Template Library & Redux Framework plugin to version 4.2.12 or later, which addresses this security issue.
- If immediate updating is not possible, consider temporarily deactivating the plugin until it can be updated.
- Regularly audit your WordPress installation for outdated plugins and themes.
- Implement a Web Application Firewall (WAF) that can help protect against common WordPress vulnerabilities.
- Consider changing WordPress authentication keys and salts after updating, as previous values may have been compromised.
- Monitor site logs for any suspicious activity that might indicate exploitation attempts.
References
- Wordfence Security Advisory: https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/
- WordPress Plugin Directory: https://wordpress.org/plugins/redux-framework/
- CWE-916: https://cwe.mitre.org/data/definitions/916.html
- WordPress Security Keys Documentation: https://wordpress.org/support/article/editing-wp-config-php/#security-keys
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade