Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
WordPress Plugin Attacks: Hackers Exploit Outdated Software

WordPress Plugin Attacks: Hackers Exploit Outdated Software

October 25, 2025 Lisa Park - Tech Editor Tech

“`html





WordPress Plugin Exploitation Campaign Targets GutenKit and Hunk Companion


WordPress Plugin Exploitation Campaign Targets GutenKit and Hunk Companion

Table of Contents

  • WordPress Plugin Exploitation Campaign Targets GutenKit and Hunk Companion
    • At a Glance
    • Understanding the Vulnerabilities
    • Affected Versions

At a Glance

  • What: ‍Mass exploitation campaign targeting WordPress plugins.
  • Wich Plugins: GutenKit⁤ and Hunk Companion.
  • Vulnerabilities: ⁤ CVE-2024-9234, CVE-2024-9707, CVE-2024-11972 ‍(Critical severity).
  • Impact: Remote Code Execution (RCE) via arbitrary plugin installation.
  • Blocked Attacks: 8.7 million attacks blocked‌ by Wordfence in two days (Oct 8-9).
  • Fixes Available: GutenKit 2.1.1 (Oct 2024), Hunk Companion 1.9.0 (Dec 2024).
  • What’s ⁤Next: WordPress administrators ⁢should immediately update to ​the latest versions of these plugins.

A widespread exploitation campaign ⁣is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues that can be used to achieve remote code execution (RCE).

WordPress security firm Wordfence says that it‍ blocked 8.7 million attack attempts against its customers in just​ two days, October​ 8 ⁢and 9.

Understanding the Vulnerabilities

The campaign exploits three flaws, tracked as CVE-2024-9234, CVE-2024-9707, ⁣and CVE-2024-11972, all ‌rated critical (CVSS ‌9.8). These vulnerabilities allow attackers to install arbitrary plugins on vulnerable WordPress sites, perhaps leading to complete site compromise.

CVE-2024-9234 is an unauthenticated REST-endpoint flaw in ⁣the GutenKit⁤ plugin (with 40,000 installs) that allows installing arbitrary⁣ plugins without authentication. ⁢This means anyone can ‌potentially install a malicious plugin on a site using a vulnerable version of GutenKit.

CVE-2024-9707 and CVE-2024-11972 are missing-authorization vulnerabilities in the ‌themehunk-import REST endpoint of the Hunk Companion plugin (8,000 installs) which can also lead to installing arbitrary plugins. Similar to CVE-2024-9234, these ⁣flaws bypass security ⁢checks, allowing unauthorized plugin installations.

An authenticated attacker can leverage these vulnerabilities to introduce another vulnerable plugin that ⁣allows remote code execution. ‌This is a ‍common⁣ tactic in exploit chains, where attackers use ⁢one vulnerability to gain a‍ foothold and then exploit further weaknesses to achieve their ultimate⁢ goal.

Affected Versions

  • CVE-2024-9234 affects GutenKit 2.1.0 and earlier
  • CVE-2024-9707 ​impacts hunk Companion 1.8.4 and ‌older
  • Share this:

    • Share on Facebook (Opens in new window) Facebook
    • Share on X (Opens in new window) X

    Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Copyright Notice
  • Disclaimer
  • Terms and Conditions

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service