Behind the Code: Identifying Zero-Day Exploits in WordPress

Journal article


Mohamed Mohideen, M.A., Nadeem, M.S., Hardy, J., Ali, H., Tariq, U.U., Sabrina, F., Waqar, M. and Ahmed, S. 2024. Behind the Code: Identifying Zero-Day Exploits in WordPress. Future Internet. 16 (7), pp. 1-22. https://doi.org/10.3390/fi16070256
AuthorsMohamed Mohideen, M.A., Nadeem, M.S., Hardy, J., Ali, H., Tariq, U.U., Sabrina, F., Waqar, M. and Ahmed, S.
Abstract

The rising awareness of cybersecurity among governments and the public underscores the importance of effectively managing security incidents, especially zero-day attacks that exploit previously unknown software vulnerabilities. These zero-day attacks are particularly challenging because they exploit flaws that neither the public nor developers are aware of. In our study, we focused on dynamic application security testing (DAST) to investigate cross-site scripting (XSS) attacks. We closely examined 23 popular WordPress plugins, especially those requiring user or admin interactions, as these are frequent targets for XSS attacks. Our testing uncovered previously unknown zero-day vulnerabilities in three of these plugins. Through controlled environment testing, we accurately identified and thoroughly analyzed these XSS vulnerabilities, revealing their mechanisms, potential impacts, and the conditions under which they could be exploited. One of the most concerning findings was the potential for admin-side attacks, which could lead to multi-site insider threats. Specifically, we found vulnerabilities that allow for the insertion of malicious scripts, creating backdoors that unauthorized users can exploit. We demonstrated the severity of these vulnerabilities by employing a keylogger-based attack vector capable of silently capturing and extracting user data from the compromised plugins. Additionally, we tested a zero-click download strategy, allowing malware to be delivered without any user interaction, further highlighting the risks posed by these vulnerabilities. The National Institute of Standards and Technology (NIST) recognized these vulnerabilities and assigned them CVE numbers: CVE-2023-5119 for the Forminator plugin, CVE-2023-5228 for user registration and contact form issues, and CVE-2023-5955 for another critical plugin flaw. Our study emphasizes the critical importance of proactive security measures, such as rigorous input validation, regular security testing, and timely updates, to mitigate the risks posed by zero-day vulnerabilities. It also highlights the need for developers and administrators to stay vigilant and adopt strong security practices to defend against evolving threats.

Keywordszero-day vulnerabilities; cross-site scripting; WordPress plugins; DAST; keylogger; NIST; CVE; OWASP
Year2024
JournalFuture Internet
Journal citation16 (7), pp. 1-22
PublisherMDPI
ISSN 1999-5903
Digital Object Identifier (DOI)https://doi.org/10.3390/fi16070256
Web address (URL)https://www.mdpi.com/1999-5903/16/7/256
Publisher's version
License
File Access Level
Open
Output statusPublished
Publication dates
Online19 Jul 2024
Publication process dates
Deposited15 Aug 2024
Permalink -

https://repository.derby.ac.uk/item/q7v96/behind-the-code-identifying-zero-day-exploits-in-wordpress

Download files


Publisher's version
futureinternet-16-00256.pdf
License: CC BY 4.0
File access level: Open

  • 22
    total views
  • 8
    total downloads
  • 3
    views this month
  • 1
    downloads this month

Export as

Related outputs

Energy-aware Successor Tree Consistent EDF Scheduling for PCTGs on MPSoCs
Tariq, UU., Ali, H., Nadeem, M.S., Jan, S.R., Sabrina, F., Grandhi, S., Wang, Z. and Liu, L. 2024. Energy-aware Successor Tree Consistent EDF Scheduling for PCTGs on MPSoCs. IEEE Access. 4, pp. 1-21. https://doi.org/10.1109/ACCESS.2024.3403418
Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things
Jan, S.R., Ghaleb, B., Tariq, U.U., Ali, H., Sabrina, F. and Liu, L. 2024. Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics. 13 (9), pp. 1-17. https://doi.org/10.3390/electronics13091651
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479