[WordPress Security] PSA: Zero-Day Vulnerability in WPGateway Actively Exploited in the Wild

From: Wordfence <list_at_wordfence.com>
Date: Tue, 13 Sep 2022 09:29:08 -0700

Attackers are exploiting an unpatched zero-day vulnerability in the WPGateway plugin to insert malicious administrators.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsdy3kWDcV1-WJV7CgKVfW43HXqj4-wqCnW1VNpQw91sC37W19X8H36hqvpgN3HZzZSdwN0MW5wdCyG6qngTHW16XYYg4tPy4fW1SwM0D1_KQc2W2Tr5mG2dlWJkW1lNcQG8bzZpSW86TRZ14SmcF7N5pwznZl-kb8W33mVxN52shTbW18xh1S3qQgVGW8jDqh85V8rMzW4s3Y4s5VBdt4W37CN8M7bbtKT33DS1 )

PSA Zero-Day vulnerability in WPGateway actively exploited in the wild-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsgk3kWF_V1-WJV7CgJdpVYXcRg8t54MDW1KRS8g6jR3stW6jVDq24N2lwfW6ZD1Rw8BVxh0W6TT-6X6Rx778W8JXLXg4FKxzkW1rqNVQ7m8CGwW5cKKn-3Ccry9VFh8qq5z3FTQW5Xyq2N1sB9_XW4Ybjw94HgXqCVrbN7C3PKvKXW67hKCB2nBzpgW3gdKnk7z0FVtW529T531h0G74W3HKKys6QqcgWN450fQwzlGssW3hyn6S9g7KQPW39ksB427RG_yW5YNDK654P6zsW2l4B8K4lGnhRW3gymvK1M90K8W5L2xmT1yHsnpW23HB1s8Fn4rqN289bQ8Q4dwcW2XMyY78MX5gWW8jF4Jm462FQsW7hj4Kq2Pth8H37cJ1 )

On September 8, 2022, the Wordfence Threat Intelligence team became aware of an actively exploited zero-day vulnerability being used to add a malicious administrator user to sites running the WPGateway plugin. We released a firewall rule to Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgHD7W4c2Bgx8ZbVsgW8c7J7h6yW020W53Fy2S1VtH1rN1jbHH9fwh-_W52TtBS37swydW8TdQS46gysd1W9bbbyf5QVrV1W7TJyXb1dQywhW1FH18D5wZVSbW4Z1Z9Q51tdVLN1SGj96QD_VKW27FtVc6njwmnW2cswnc8hHRWrW61wwqG5qrXQhW1Ry5Lp2XxLfhVLRKnY5X6NfZW9dzbxK1sR8qtW1lfRRR6Tx-NXW6xsy2k1jPnY3W3XkjVY8cDw7h312Y1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgRZPW3H9hgl4DXLFKW6c_c7-6lWp1-W45fCYp8FVHcjW7YDGM12bFKvLW6JGzdR2Fw8ZbVM_yt86K5Bj8W1KfB481sPmcHW6bdRC_3jcf0qW3zG6lg6GxdgYVzdlqV2z_7v_VhVR-V2TFbWvW7-GkGd3wjcxGVD_-RT2HSsKqW6Jgrdx6fnhYBW50QmsZ85GXdCW1P1zs67fDm0-VcvWqW1GXPprW7X69hm34TSBhW3M_TPf5J0BxPW3HVYrM7JtDRr3n2l1 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgD5lW4trt364FFpx5W7YymH-1Q-hCFW7QtvqM8LMxCMW8cwxvL70tbhXW1kVKWT1qNN78W2WTDny21ds3YW8R5BTK54FqX_W16KT0g6jD7NnW8L9l0Y6ksW9ZW393P9L5XKRx_W20Tl0Q3kHH4RW23js2Z7xQ-hBW7Jlv7T836vnzW9h7wSj441XM1W4zthMd904k-YW97Hb1G6HBlS4W2jpszz8Dw_g3W7K_p_V1TkK42W8dzLhQ6Ym-7_VMJhPF63Zkr53jWD1 ) customers to block the exploit on the same day, September 8, 2022.

Sites still running the free version of Wordfence will receive the same protection 30 days later, on October 8, 2022. The Wordfence firewall has successfully blocked over 4.6 million attacks targeting this vulnerability against more than 280,000 sites in the past 30 days.

This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsgk3kWF_V1-WJV7CgJdpVYXcRg8t54MDW1KRS8g6jR3stW6jVDq24N2lwfW6ZD1Rw8BVxh0W6TT-6X6Rx778W8JXLXg4FKxzkW1rqNVQ7m8CGwW5cKKn-3Ccry9VFh8qq5z3FTQW5Xyq2N1sB9_XW4Ybjw94HgXqCVrbN7C3PKvKXW67hKCB2nBzpgW3gdKnk7z0FVtW529T531h0G74W3HKKys6QqcgWN450fQwzlGssW3hyn6S9g7KQPW39ksB427RG_yW5YNDK654P6zsW2l4B8K4lGnhRW3gymvK1M90K8W5L2xmT1yHsnpW23HB1s8Fn4rqN289bQ8Q4dwcW2XMyY78MX5gWW8jF4Jm462FQsW7hj4Kq2Pth8H37cJ1 ) Or you can read the full post in this email.

Vulnerability Details

Description: Unauthenticated Privilege Escalation

Affected Plugin: WPGateway

Plugin Slug: wpgateway

Plugin Developer: Jack Hopman/WPGateway

Affected Versions: <= 3.5

CVE ID: CVE-2022-3180

CVSS Score: 9.8 (Critical)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Fully Patched Version: N/A

The WPGateway plugin is a premium plugin tied to the WPGateway cloud service, which offers its users a way to setup and manage WordPress sites from a single dashboard. Part of the plugin functionality exposes a vulnerability that allows unauthenticated attackers to insert a malicious administrator.

We obtained a current copy of the plugin on September 9, 2022, and determined that it is vulnerable, at which time we contacted the plugin vendor with our initial disclosure. We have reserved vulnerability identifier CVE-2022-3180 for this issue.

As this is an actively exploited zero-day vulnerability, and attackers are already aware of the mechanism required to exploit it, we are releasing this public service announcement (PSA) to all of our users. We are intentionally withholding certain details to prevent further exploitation. As a reminder, an attacker with administrator privileges has effectively achieved a complete site takeover.

Indicators of compromise

If you are working to determine whether a site has been compromised using this vulnerability, the most common indicator of compromise is a malicious administrator with the username of rangex.

If you see this user added to your dashboard, it means that your site has been compromised.

Additionally, you can check your site’s access logs for requests to //wp-content/plugins/wpgateway/wpgateway-webservice-new.php?wp_new_credentials=1

If these requests are present in your logs, they indicate that your site has been attacked using an exploit targeting this vulnerability, but do not necessarily indicate that it has been successfully compromised.

Conclusion

In today’s post, we detailed a zero-day vulnerability being actively exploited in the WPGateway plugin.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgHD7W4c2Bgx8ZbVsgW8c7J7h6yW020W53Fy2S1VtH1rN1jbHH9fwh-_W52TtBS37swydW8TdQS46gysd1W9bbbyf5QVrV1W7TJyXb1dQywhW1FH18D5wZVSbW4Z1Z9Q51tdVLN1SGj96QD_VKW27FtVc6njwmnW2cswnc8hHRWrW61wwqG5qrXQhW1Ry5Lp2XxLfhVLRKnY5X6NfZW9dzbxK1sR8qtW1lfRRR6Tx-NXW6xsy2k1jPnY3W3XkjVY8cDw7h312Y1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgRZPW3H9hgl4DXLFKW6c_c7-6lWp1-W45fCYp8FVHcjW7YDGM12bFKvLW6JGzdR2Fw8ZbVM_yt86K5Bj8W1KfB481sPmcHW6bdRC_3jcf0qW3zG6lg6GxdgYVzdlqV2z_7v_VhVR-V2TFbWvW7-GkGd3wjcxGVD_-RT2HSsKqW6Jgrdx6fnhYBW50QmsZ85GXdCW1P1zs67fDm0-VcvWqW1GXPprW7X69hm34TSBhW3M_TPf5J0BxPW3HVYrM7JtDRr3n2l1 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgD5lW4trt364FFpx5W7YymH-1Q-hCFW7QtvqM8LMxCMW8cwxvL70tbhXW1kVKWT1qNN78W2WTDny21ds3YW8R5BTK54FqX_W16KT0g6jD7NnW8L9l0Y6ksW9ZW393P9L5XKRx_W20Tl0Q3kHH4RW23js2Z7xQ-hBW7Jlv7T836vnzW9h7wSj441XM1W4zthMd904k-YW97Hb1G6HBlS4W2jpszz8Dw_g3W7K_p_V1TkK42W8dzLhQ6Ym-7_VMJhPF63Zkr53jWD1 ) customers received a firewall rule on September 8, 2022, protecting against this vulnerability, while sites still using the free version of Wordfence will receive the same protection 30 days later, on October 8, 2022.

If you have the WPGateway plugin installed, we urge you to remove it immediately until a patch is made available and to check for malicious administrator users in your WordPress dashboard.

If you know a friend or colleague who is using this plugin on their site, we highly recommend forwarding this advisory to them to help keep their sites protected, as this is a serious vulnerability that is actively being exploited in the wild. Please help make the WordPress community aware of this issue.

If you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgRZPW3H9hgl4DXLFKW6c_c7-6lWp1-W45fCYp8FVHcjW7YDGM12bFKvLW6JGzdR2Fw8ZbVM_yt86K5Bj8W1KfB481sPmcHW6bdRC_3jcf0qW3zG6lg6GxdgYVzdlqV2z_7v_VhVR-V2TFbWvW7-GkGd3wjcxGVD_-RT2HSsKqW6Jgrdx6fnhYBW50QmsZ85GXdCW1P1zs67fDm0-VcvWqW1GXPprW7X69hm34TSBhW3M_TPf5J0BxPW3HVYrM7JtDRr3n2l1 ) . If you need your site cleaned immediately, Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgD5lW4trt364FFpx5W7YymH-1Q-hCFW7QtvqM8LMxCMW8cwxvL70tbhXW1kVKWT1qNN78W2WTDny21ds3YW8R5BTK54FqX_W16KT0g6jD7NnW8L9l0Y6ksW9ZW393P9L5XKRx_W20Tl0Q3kHH4RW23js2Z7xQ-hBW7Jlv7T836vnzW9h7wSj441XM1W4zthMd904k-YW97Hb1G6HBlS4W2jpszz8Dw_g3W7K_p_V1TkK42W8dzLhQ6Ym-7_VMJhPF63Zkr53jWD1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both these products include hands-on support in case you need further assistance.

Our investigation is ongoing, and we will provide more information in an additional blog post when it becomes available.

Special thanks to Threat Intelligence Lead Chloe Chamberland for spotting this exploit in the wild.

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgCTnW3fLHC36DJ13zW6qzDh93PPVhrN8QHn4MXwGslW743P0x84jGJfN5t5-nnc98-YW3BCRx05x4ptNW6xZ-V913gLflW2fTW2s8BZnNgW49_2XC1YTX1_W2p8sXk8nlJgTVk_zqR1sNx1zW77yPrH4VnvQDW5XvVdz5J4cY2W1X9NYx1R0q3vN6kxDBQn9BxNW2kXk4V8dFLWLW8gRNFZ5ks-qnW3bwkC-4GwwJKW3VpgRY5RHVRbW14GK4t16dG6J31cl1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgLMtN3YL1ZRVZb3wW71DlG06VYP2gW2H1CDB2gg3FcW1bLv3c7R_MR7W6LgcxZ57yPRlW8X0dYd7xCxVTW7d04ns2MzGtrW4Gl3My9dtHp8W5x1Clb5njjVcW1mH05Q13g3zVW98Z2XT42Dy-XW2P-bMC2_GtpdVf_z_18wgTglW9f8FwS8HcFlcW4W9WWN751W67W582BbW1yDJkYW2B3LR12mq1bKW31--Kb2wsLp1W7fjfpG57PGvzVq-ygV5Zn46Y37cv1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgL2ZW3RsQQh3_6smdW84wJJC69hq_DVylCc-5g96bLVN6VXH4tqXSpW5w8P1_6xHkKZN5Kp9rvcnJlJF4PsMF6GmSVW10SFcT5bj_KNW6KZTq14YQ7T3W7P1bkY6SwgwCN3xYxwbLFb_tW7MD73h7KR14PW52TDs08Ln4B6W4kFYpz4ksnZ4W33H4MG1KLMrmW1k-r1F15K9cKW4v5ljd3fxhynW257J0g78MbqhW5LbpY21y38QxN3slGmYRqzDZ3mq41 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsf73kWDQV1-WJV7CgWNJW4qfGqV8mGVQmW1wt5dS8H_MKLW31h-_d1TdY6wW3TjvtC6nZmK5W591vJN23B8dxW8QF4ws8_-lfbVpH8Yx52J_DxW6FL6q55_tRZ7W7fYqWX2LxdWdW4htCXv3hjmY_W6S0W_g8NHvBvVfJkfl98N4VrW6rMfRn1PRsynW2l58DG25CvytW40cVXK2KRGJmW4mBpmb9g372WW40XKw58L5LhvW7p1wHj6bTQx5W6vycGL7Dxk5HW63hFWF5KRCdl331m1 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsfr3kWF5V1-WJV7Cg-l3W88Y2Tn22rYy9W6cdMnr6PDGDbW1Cf4T38lqN50W2pQw0R2wGyN1W1WMQXz5-_FCXW4wJ4bW8tgPHbW69zqkf99SnxWW3BxkR246F9NyW1Hrq9T4ZcnPgW2Fs3NC5TlZc6W96s3l06lsN-8W5hQQzS5WGCBFW1c2xgp6Ny8d3W7VYynq3X7glSW5-r34x8X6-yRW5YplV99cwzTJW40Tv_C1j0rK1W95Z3x-5VnjMwN7xxDxY8bXQLN1Wts01qBNxRW1ql0dn8MpfjbW3yNNt-2vSTw13fjp1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW7-Pc8zC8_qW85sFkb2zcTmSW6cqVBw4PWM9RN4Mwsdy3kWDcV1-WJV7CgDLnVhWnDs4fGGFlW7dwv2s1Qsyg5W5rn4Dh2j4BM3W2Lqj1S1mQl-bW2xmQfy2ftKmdW8T811j2N2hglW2t2PGD7WrrGsW6VN-vh5qGcpWW6xD86Y17ycTPV2dzWC6CJJVbMgsyz7XQGjmW46zKrl4Cr8-WN57QVJlrCQtdW7B_Nkx6wT6TDW27fmXw5c99KXW3zXZlB252RpJ3kBH1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcN8W5SCp4H502-X0V25zyw8f9PZQW93jRTH4NN_mBN6yyQv91yf0NW30CmQp722R5xW7Dq5_56Z_1Ghn8RY5tY1r3&v=3&_hsenc=p2ANqtz-9Eiz1eckBwOFdTBoi0TDuocN6FsBu7IpUnxfG9f5uIUOCFbo5jWIo2z2EjdElcFxFK85b8lZqtSeCEhhNQ4_KuaQtg4g&_hsmi=225889983 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcN8W5SCp4H502-X0V25zyw8f9PZQW93jRTH4NN_mBN6yyQv91yf0NW30CmQp722R5xW7Dq5_56Z_1Ghn8RY5tY1r3&v=3&_hsenc=p2ANqtz-9Eiz1eckBwOFdTBoi0TDuocN6FsBu7IpUnxfG9f5uIUOCFbo5jWIo2z2EjdElcFxFK85b8lZqtSeCEhhNQ4_KuaQtg4g&_hsmi=225889983 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Sep 13 2022 - 18:29:10 CEST

This archive was generated by hypermail 2.3.0 : Tue Sep 13 2022 - 18:32:25 CEST