A critical vulnerability in a WordPress plugin used on over one million websites has been patched, after evidence emerged that malicious hackers were actively exploited in the wild.
WordPress has pushed out a forced automatic update to the widely-used Ninja Forms plugin after security researchers.
According to an analysis by experts at WordFence, the vulnerability “could allow attackers to execute arbitrary code or delete arbitrary files on sites.”
In short, an unauthenticated attacker could exploit the security hole in the Ninja Forms WordPress plugin to run code of their own choice, and gain complete control over a vulnerable website.
Nasty. And clearly WordPress thought so, as it appears to have initiated a forced update to third-party WordPress-powered websites running vulnerable versions of the plugin.
That forced update to the plugin took some website owners by surprise, as it occurred without any prior communication:
Website administrators who view the Ninja Forms changelog may not initially recognise quite how serious things the vulnerability was:
3.6.11 (14 June 2022)
* Apply more strict sanitization to merge tag values
If you run the Ninja Forms plugin on your WordPress website, make sure that you are running the latest version. According to Wordfence, the flaw has been fully patched in versions 184.108.40.206, 3.1.10, 3.2.28, 220.127.116.11, 18.104.22.168, 22.214.171.124, and 3.6.11.