WPGateway is one of the WordPress plugins that allows you to simplify various tasks, including website backup and managing themes and plugins from a centralized dashboard. The CVE-2022-3180 vulnerability would allow an external actor with administrator privileges to impersonate these websites that use this plugin.

One of Wordfence's analysts has highlighted that his company's Firewall has successfully blocked more than 4 millions of attacks attacking more than 250.000 websites that have this vulnerability in the last month.

To check for intrusion, you must go to the list of users of the WordPress dashboard in search of the rangex user, with administrator privileges. Additionally, the records of /wp-content/plugins/wpgateway/wpgateway-webservice-new.php?wp_new_credentials=1 to check if the website has been attacked.

In case you have this plugin installed, WPGateway authors strongly recommend uninstalling it completely until they apply a security patch.

Fountain: Bleeping Computer


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
A cybercriminal manages to use AI to steal data from the Mexican Government
Read more »
Intec creates an AI that redefines the rules of the game in cybersecurity in the AI era.
Read more »
Una exfiltración de datos afecta a un proveedor de Adidas
Read more »
Se incrementan un 26% los incidentes de ciberseguridad
Read more »
Un ciberataque paraliza en Roma la Universidad La Sapienza
Read more »