2024 WordPress Vulnerability Report Shows Errors Sites Keep Making via @sejournal, @martinibuster

1 week ago 14
ARTICLE AD BOX

WordPress information scanner WPScan’s 2024 WordPress vulnerability study calls attraction to WordPress vulnerability trends and suggests the kinds of things website publishers (and SEOs) should beryllium looking retired for.

Some of the cardinal findings from the study were that conscionable implicit 20% of vulnerabilities were rated arsenic precocious oregon captious level threats, with mean severity threats, astatine 67% of reported vulnerabilities, making up the majority. Many respect mean level vulnerabilities arsenic if they are low-level threats but they’re not and should beryllium regarded arsenic deserving attention.

The WPScan study advised:

“While severity doesn’t construe straight to the hazard of exploitation, it’s an important line for website owners to marque an educated determination astir erstwhile to disable oregon update the extension.”

WordPress Vulnerability Severity Distribution

Critical level vulnerabilities, the highest level of threat, represented lone 2.38% of vulnerabilities, which is (essentially bully quality for WordPress publishers. Yet arsenic mentioned earlier, erstwhile combined with the percentages of precocious level threats (17.68%) the fig oregon concerning vulnerabilities rises to astir 20%.

Here are the percentages by severity ratings:

  • Critical 2.38%
  • Low 12.83%
  • High 17.68%
  • Medium 67.12%

Graph of WordPress vulnerabilities showing percentages by severity

Authenticated Versus Unauthenticated

Authenticated vulnerabilities are those that necessitate an attacker to archetypal attain idiosyncratic credentials and their accompanying support levels successful bid to exploit a peculiar vulnerbility. Exploits that necessitate subscriber-level authentication are the astir exploitable of the authenticated exploits and those that necessitate head level entree contiguous the slightest hazard (although not ever a debased hazard for a assortment of reasons).

Unauthenticated attacks are mostly the easiest to exploit due to the fact that anyone tin motorboat an onslaught without having to archetypal get a idiosyncratic credential.

The WPScan vulnerability study recovered that astir 22% of reported vulnerabilities required subscriber level oregon nary authentication astatine all, representing the astir exploitable vulnerabilities. On the different extremity of the standard of the exploitability are vulnerabilities requiring admin support levels representing a full of 30.71% of reported vulnerabilities.

Permission Levels Required For Exploits

Vulnerabilities requiring head level credentials represented the highest percent of exploits, followed by Cross Site Request Forgery (CSRF) with 24.74% of vulnerabilities. This is absorbing due to the fact that CSRF is an onslaught that uses societal engineering to get a unfortunate to click a nexus from which the user’s support levels are acquired. If they tin instrumentality an admin level idiosyncratic to travel a nexus past they volition beryllium capable to presume that level of privileges to the WordPress website.

The pursuing is the percentages of exploits ordered by roles indispensable to motorboat an attack.

Ascending Order Of User Roles For Vulnerabilities

  • Author 2.19%
  • Subscriber 10.4%
  • Unauthenticated 12.35%
  • Contributor 19.62%
  • CSRF 24.74%
  • Admin 30.71%

Most Common Vulnerability Types Requiring Minimal Authentication

Broken Access Control successful the discourse of WordPress refers to a information nonaccomplishment that tin let an attacker without indispensable support credentials to summation entree to higher credential permissions.

In the conception of the study that looks astatine the occurrences and vulnerabilities underlying unauthenticated oregon subscriber level vulnerabilities reported (Occurrence vs Vulnerability connected Unauthenticated oregon Subscriber+ reports), WPScan breaks down the percentages for each vulnerability benignant that is astir communal for exploits that are the easiest to motorboat (because they necessitate minimal to nary idiosyncratic credential authentication).

The WPScan menace study noted that Broken Access Control represents a whopping 84.99% followed by SQL injection (20.64%).

The Open Worldwide Application Security Project (OWASP) defines Broken Access Control as:

“Access control, sometimes called authorization, is however a web exertion grants entree to contented and functions to immoderate users and not others. These checks are performed aft authentication, and govern what ‘authorized’ users are allowed to do.

Access power sounds similar a elemental occupation but is insidiously hard to instrumentality correctly. A web application’s entree power exemplary is intimately tied to the contented and functions that the tract provides. In addition, the users whitethorn autumn into a fig of groups oregon roles with antithetic abilities oregon privileges.”

SQL injection, astatine 20.64% represents the 2nd astir prevalent benignant of vulnerability, which WPScan referred to arsenic some “high severity and risk” successful the discourse of vulnerabilities requiring minimal authentication levels due to the fact that attackers tin entree and/or tamper with the database which is the bosom of each WordPress website.

These are the percentages:

  • Broken Access Control 84.99%
  • SQL Injection 20.64%
  • Cross-Site Scripting 9.4%
  • Unauthenticated Arbitrary File Upload 5.28%
  • Sensitive Data Disclosure 4.59%
  • Insecure Direct Object Reference (IDOR) 3.67%
  • Remote Code Execution 2.52%
  • Other 14.45%

Vulnerabilities In The WordPress Core Itself

The overwhelming bulk of vulnerability issues were reported successful third-party plugins and themes. However, determination were successful 2023 a full of 13 vulnerabilities reported successful the WordPress halfway itself. Out of the thirteen vulnerabilities lone 1 of them was rated arsenic a precocious severity threat, which is the 2nd highest level, with Critical being the highest level vulnerability threat, a standing scoring strategy maintained by the Common Vulnerability Scoring System (CVSS).

The WordPress halfway level itself is held to the highest standards and benefits from a worldwide assemblage that is vigilant successful discovering and patching vulnerabilities.

Website Security Should Be Considered As Technical SEO

Site audits don’t usually screen website information but successful my sentiment each liable audit should astatine slightest speech astir information headers. As I’ve been saying for years, website information rapidly becomes an SEO contented erstwhile a website’s ranking commencement disappearing from the hunt motor results pages (SERPs) owed to being compromised by a vulnerability. That’s wherefore it’s captious to beryllium proactive astir website security.

According to the WPScan report, the main constituent of introduction for hacked websites were leaked credentials and anemic passwords. Ensuring beardown password standards positive two-factor authentication is an important portion of each website’s information stance.

Using information headers is different mode to assistance support against Cross-Site Scripting and different kinds of vulnerabilities.

Lastly, a WordPress firewall and website hardening are besides utile proactive approaches to website security. I erstwhile added a forum to a marque caller website I created and it was instantly nether onslaught wrong minutes. Believe it oregon not, virtually each website worldwide is nether onslaught 24 hours a time by bots scanning for vulnerabilities.

Read the WPScan Report:

WPScan 2024 Website Threat Report

Featured Image by Shutterstock/Ljupco Smokovski