WordPress

Critical Vulnerability Strikes WordPress Ad Inserter Plugin

Ad Inserter, a widely-used ad management plugin for WordPress, has been found to have a critical vulnerability. This flaw permits an authenticated user, even with subscriber-level privileges, to execute code on the affected website. Users of the plugin are strongly advised to update immediately.

Screenshot of WordPress Dashboard Update Link

Description of Ad Inserter Vulnerability

There are actually two vulnerabilities.

Authenticated Path Traversal Exploit

The first vulnerability is known as an Authenticated Path Traversal Exploit. This issue exists in Ad Inserter version 2.4.19 and earlier. Such exploits allow an attacker to access restricted areas of a site by manipulating the URL, using variables like ../. This helps the attacker to potentially execute code or access private information. According to the Common Weakness Enumeration, maintained by the U.S. Department of Homeland Security, this is how a path traversal exploit works:

"The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory."

Authenticated Remote Code Execution

The second vulnerability, labeled as critical, was discovered on Friday, July 12th by the WordFence team and promptly fixed by Ad Inserter the next day, on Saturday, July 13, 2019. This is called an Authenticated Remote Code Execution (RCE). This vulnerability allows any registered user with permissions as low as a subscriber to execute arbitrary code on a WordPress installation. The RCE exploit affects Ad Inserter version 2.4.21 and earlier.

According to WordFence:

"On Friday, July 12th, our Threat Intelligence team discovered a vulnerability present in Ad Inserter, a WordPress plugin installed on over 200,000 websites. The weakness allowed authenticated users (Subscribers and above) to execute arbitrary PHP code on websites using the plugin. We privately disclosed the issue to the plugin’s developer, who released a patch the very next day. This is considered a critical security issue…"

Ad Inserter Plugin Reacted Swiftly and Ethically

Almost all plugins and software may contain vulnerabilities. What’s crucial is the developer’s response to these issues and their transparency about it. The Ad Inserter team deserves praise for their rapid response and transparency regarding the updates. Ad Inserter informed users of the vulnerability through a changelog visible on the update page, signaling the urgency of the update.

Ad Inserter WordPress Plugin Changelog

The Ad Inserter team acted both swiftly and ethically, which is the best that can be expected from any WordPress developer.

Update Ad Inserter

All users of the Ad Inserter WordPress plugin are urged to log in to their WordPress installation and update their Ad Inserter plugin.

Read the WordFence announcement for more details.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button