NinjaForms WordPress plugin, actively exploited in wild, receives forced security update • Graham Cluley

NinjaForms WordPress plugin, actively exploited in wild, receives forced security update

A critical vulnerability in a WordPress plugin used on over one million websites has been patched, after evidence emerged that malicious hackers were actively exploited in the wild.

WordPress has pushed out a forced automatic update to the widely-used Ninja Forms plugin after security researchers.

According to an analysis by experts at WordFence, the vulnerability “could allow attackers to execute arbitrary code or delete arbitrary files on sites.”

Sign up to our newsletter
Security news, advice, and tips.

In short, an unauthenticated attacker could…


More Info

About mblog.my

Check Also

Malware campaign compromises over 4,500 WordPress sites | SC Media – SC Media

Military-grade xIoT hacking tools are in use, cybercrime for hire that’s predicated on compromised xIoT …

Leave a Reply

Your email address will not be published. Required fields are marked *