NinjaForms WordPress plugin, actively exploited in wild, receives forced security update • Graham Cluley

NinjaForms WordPress plugin, actively exploited in wild, receives forced security update

A critical vulnerability in a WordPress plugin used on over one million websites has been patched, after evidence emerged that malicious hackers were actively exploited in the wild.

WordPress has pushed out a forced automatic update to the widely-used Ninja Forms plugin after security researchers.

According to an analysis by experts at WordFence, the vulnerability “could allow attackers to execute arbitrary code or delete arbitrary files on sites.”

Sign up to our newsletter
Security news, advice, and tips.

In short, an unauthenticated attacker could…


More Info

About mblog.my

Check Also

WP Engine Achieves Prestigious ISO/IEC 27001:2013 Certification for Enterprise Security for WordPress Sites

WP Engine proves maturity of security program and power of WordPress, meeting international standards for …

Leave a Reply

Your email address will not be published. Required fields are marked *