Hunk Companion WordPress plugin exploited to install vulnerable plugins
Hackers are exploiting a critical vulnerability in the "Hunk Companion" plugin to install and activate other plugins with exploitable flaws directly from the WordPress.org repository.
By installing outdated plugins with known vulnerabilities with available exploits, the attackers can access a large pool of flaws that lead to remote code execution (RCE), SQL injection, cross-site scripting (XSS) flaws, or create backdoor admin accounts.
The activity was discovered by WPScan, who reported it to Hunk Companion, with a security update addressing the zero-day flaw released yesterday.
Installing vulnerable plugins
Hunk Companion is a WordPress plugin designed to complement and enhance the functionality of themes developed by ThemeHunk, a provider of customizable WordPress themes, so it's more of an add-on rather than a standalone plugin.
According to WordPress.org stats, Hunk Companion is currently used by over 10,000 WordPress sites, so it's a relatively niche tool in the space.
The critical vulnerability was discovered by WPScan researcher Daniel Rodriguez and is tracked as CVE-2024-11972. The flaw allows the arbitrary installation of plugins by means of unauthenticated POST requests.
The issue impacts all versions of Hunk Companion before the latest 1.9.0, released yesterday, which addressed the problem.
While investigating a WordPress site infection, WPScan discovered active exploitation of CVE-2024-11972 to install a vulnerable version of WP Query Console.
This is an obscure plugin last updated over 7 years ago, which the hackers exploited to execute malicious PHP code on the targeted sites, leveraging the zero-day RCE flaw CVE-2024-50498.
"In the infections we've analyzed, attackers use the RCE to write a PHP dropper to the site's root directory," explains WPScan.
"This dropper allows continued unauthenticated uploads via GET requests, enabling persistent backdoor access to the site."
It's worth noting that Hunk Companion fixed a similar flaw in version 1.8.5, which was tracked under CVE-2024-9707, but apparently, the patch wasn't adequate, and ways to bypass it exist.
Given the flaw's severity and its active exploitation status, users of Hunk Companion are recommended to update to 1.9.0 as soon as possible.
At the time of writing, the latest version has been downloaded roughly 1,800 times, so at least eight thousand websites remain vulnerable to exploitation.
source: BleepingComputer
Free online web security scanner
Top News:

New NailaoLocker ransomware used against EU healthcare orgs
February 20, 2025
Black Basta ransomware gang's internal chat logs leak online
February 21, 2025
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
February 19, 2025
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
February 21, 2025
Windows Server 2025 released—here are the new features
November 5, 2024
SonicWall firewall bug leveraged in attacks after PoC exploit release
February 15, 2025