Facebook for WordPress Plugin Vulnerability Targets +500,000 Sites – Search Engine Journal

Two exploits affecting the popular Facebook for WordPress plugin can lead to a total site takeover and malicious backdoors
Two vulnerabilities were patched in the Facebook for WordPress Plugin. The exploits could allow a malicious attacker to install backdoors, create administrator level accounts and stage a complete site takeover.
Facebook for WordPress plugin, installed in over 500,000 websites, is a site visitor tracking plugin for advertisers that use Facebook ads. It allows advertisers to track the visitor journey and optimize their ad campaigns.
One of the exploits was discovered in December 2020. The other flaw was introduced in January 2021 as part of a rebranding and code update to the plugin.
This kind of exploit depends on a flaw that inadequately sanitizes uploads which in turn allows an attacker to perform a variety of attacks such as code injection.
In this specific attack a hacker could use the compromised plugin to upload a file and proceed to a remote code execution.
The particulars of this vulnerability could also allow the attacker to take advantage of other plugins containing the vulnerability.
According to Wordfence:
“This meant that an attacker could generate a PHP file new.php in a vulnerable site’s home directory… The PHP file contents could be changed to anything… which would allow an attacker to achieve remote code execution.
Note that the presence of a full POP chain also meant that any other plugin with an object injection vulnerability, including those that did not require knowledge of the site’s salts and keys, could potentially be used to achieve remote code execution as well if it was installed on a site with the Facebook for WordPress plugin.”
A cross site request forgery exploit is a type that requires a victim with administrator level credentials to a WordPress site to perform an action (like click on a link) which would then lead to an attack that takes advantage of the administrators high level credentials.
An attacker could gain access to private metric data or stage a complete site takeover.
Wordfence describes it like this:
“The action could be used by an attacker to update the plugin’s settings to point to their own Facebook Pixel console and steal metric data for a site.
Worse yet, since there was no sanitization on the settings that were stored, an attacker could inject malicious JavaScript into the setting values.
These values would then be reflected on the settings page, causing the code to execute in a site administrator’s browser while accessing the settings page.
Ultimately, this code could be used to inject malicious backdoors into theme files or create new administrative user accounts that could be used for complete site takeover.”
It is recommended that all users immediately update their plugin to the latest version (currently Version 3.0.5). Facebook for WordPress version 3.0.4 is fully patched but version 3.0.5 is the most up to date version of the plugin.
Two Vulnerabilities Patched in Facebook for WordPress Plugin
Facebook for WordPress Changelog
Get our daily newsletter from SEJ’s Founder Loren Baker about the latest news in the industry!
Roger Montti is a search marketer with over 20 years experience. I offer site audits, phone consultations and content and … [Read full bio]
Subscribe to our daily newsletter to get the latest industry news.
Subscribe to our daily newsletter to get the latest industry news.


Leave a Reply

Your email address will not be published. Required fields are marked *