cyber security, Hacking News, hacking wordpress, Wordpress, WordPress plugin, Wordpress plugin vulnerability, WordPress Vulnerability

New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions

Security researchers have been warning about a critical vulnerability they discovered in one of a popular WordPress Live Chat plugin, which, if exploited, could allow unauthorized remote attackers to steal chat logs or manipulate chat sessions.

The vulnerability, identified as CVE-2019-12498, resides in the “WP Live Chat Support” that is currently being used by over 50,000 businesses to provide customer support and chat with visitors through their websites.

Discovered by cybersecurity researchers at Alert Logic, the flaw originates because of an improper validation check for authentication that apparently could allow unauthenticated users to access restricted REST API endpoints.

wordpress live chat hacking

As described by researchers, a potential remote attacker can exploit exposed endpoints for malicious purposes, including:

  • stealing the entire chat history for all chat sessions,
  • modifying or deleting the chat history,
  • injecting messages into an active chat session, posing as a customer support agent,
  • forcefully ending active chat sessions, as part of a denial of service (DoS) attack.

The flaw affect all WordPress websites those are still using WP Live Chat Support version 8.0.32 or earlier to offer live support.

Researchers responsibly reported the issue to the maintainers of this affected WordPress plugin, who then proactively and immediately released an updated and patched version of their plugin just last week.

Though researchers haven’t yet seen any active exploitation of the flaw in the wild, WordPress administrators are highly recommended to install the latest version of the plugin as soon as possible.

//l&&!o&&(jQuery.ajax({url:”″,type:”get”,cache:!1,dataType:”jsonp”,success:function(e){for(var t=””,r=””,s=0;s<e.feed.entry.length;s++){for(var a=0;a<e.feed.entry[s].link.length;a++)if("alternate"==e.feed.entry[s].link[a].rel){t=e.feed.entry[s].link[a].href;break}if("content"in e.feed.entry[s])var n=e.feed.entry[s].content.$t;else n="summary"in e.feed.entry[s]?e.feed.entry[s].summary.$t:"";100<(n=n.replace(/]*>/g,””)).length&&(n=n.substring(0,90));var l=e.feed.entry[s].title.$t;l=l.substring(0,50);var o=e.feed.entry[s].media$thumbnail.url.replace(//s72-c-e100/,”/s260-e100″);o=o.replace(/http://1.bp.blogspot|http://2.bp.blogspot|http://3.bp.blogspot|http://4.bp.blogspot|https://2.bp.blogspot|https://3.bp.blogspot|https://4.bp.blogspot/,”https://1.bp.blogspot”),r+=’

“}r+=””,document.getElementById(“result”).innerHTML=r}}),e=window,t=document,r=”script”,s=”stackSonar”,e.StackSonarObject=s,e[s]=e[s]””function(){(e[s].q=e[s].q””[]).push(arguments)},e[s].l=1*new Date,a=t.createElement(r),n=t.getElementsByTagName(r)[0],a.async=1,a.src=””,n.parentNode.insertBefore(a,n),stackSonar(“stack-connect”,”233″),o=!0)})});

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

twenty − 5 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.