Vulnerability Details: Option Update Vulnerability in WP GDPR Compliance
Yesterday we discussed a PHP object injection vulnerability that had been fixed in the plugin WP GDPR Compliance in relation to a topic on the WordPress Support Forum related to a plugin being installed on websites. Today there have been several reports claiming that websites were hacked through WP GDPR Compliance to create new Administrator accounts, which seems likely to be caused by code related to the vulnerable code we discussed with the PHP object injection vulnerability. That issue is described, though not detailed by Adrian Mörchen in an entry on the WPScan Vulnerability Database.
...
This post provides insights on a vulnerability in the WordPress plugin WP GDPR Compliance not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.