SUBSCRIBE

Over 90 WordPress themes and plugins from AccessPress hacked, says report

WordPress admins who use any plugins or themes downloaded from AccessPress are being urged to take action after researchers discovered that backdoors were installed in many of the app makerโ€™s products months ago.

AccessPress plugins and themes downloaded from WordPress.org are okay. However, those downloaded since September from AccessPress need mitigation.

According to researchers at WordPress security firm Jetpack, who discovered the compromise, as of January 18th most AccessPress plugins had been updated, however, as of that date the affected themes had not been updated, and were pulled from the WordPress.org theme repository. It isnโ€™t clear at the time of publishing if AccessPress themes had been updated.

Admins should scour their systems for signs of compromise in addition to updating plugins and themes if their WordPress systems use the affected extensions. Jetpack notes that upgrading to a new version of a theme or plugin doesnโ€™t remove the backdoor from a system, and says admins should reinstall a clean version of WordPress to revert the core file modifications done during installation of the backdoor.

According to researcher Ben Martin at Sucuri, once the AccessPress website was compromised the attackers placed PHP backdoors into many of its free plugins and themes. Martin said 40 themes were known to be affected, as well as 53 plugins.

โ€œThe backdoor was quite simple,โ€ he said, โ€œbut provided the attackers with full control over the victimโ€™s websites.โ€

Based in Nepal, AccessPress makes 64 free and paid themes and templates to make things easier for WordPress designers, and 109 plugins to expand WordPress capabilities. Plugins include contact forms, blog managers and e-commerce aids.

WordPress plugins from a variety of developers have been targets for hackers for years, who often use them to access credit/debit card data from online shoppers.

Related content: Vulnerabilities in WordPress plugins more than doubled in 2021

Jetpack said the infected extensions contained a dropper for a webshell that gives the attackers full access to the infected sites. The dropper is located in the fileย inital.php located in the main plugin or theme directory. When run it, installs a cookie based webshell inย wp-includes/vars.php.ย The shell is installed as a function just in front of theย wp_is_mobile()ย function with the name ofย wp_is_mobile_fix(). This, Jetpack said, is presumably to not arouse suspicion to anybody casually scrolling through the vars.phpย file.

Once the shell is installed, Jetpack said, the dropper will phone home by loading a remote image from the URL hxxps://wp-theme-connect.com/images/wp-theme.jpgย with the url of the infected site and information about which theme it uses as query arguments.ย Finally, it will remove the dropper source file to avoid detection when the request is finished executing.

โ€œIf you have any themes or plugins installed directly from AccessPress Themes or any other place except WordPress.org, you should upgrade immediately to a safe version as indicated in the tables above,โ€ Jetpack said. โ€œIf no safe version is available, replace it with the latest version from WordPress.org.โ€

Again, Jetpack urges admins to reinstall a clean version of WordPress to revert the core file modifications done during installation of the back door.

โ€œWe strongly recommend that you have a security planย for your site that includesย malicious file scanningย andย backups,โ€ Jetpack said.

Sucuri said admins should follow the standard post-infection steps like updating wp-admin administrator and database passwords as a precaution.

Tech Jobs

Categories