{"id":4414,"date":"2023-05-22T20:30:11","date_gmt":"2023-05-22T20:30:11","guid":{"rendered":"https:\/\/afreeurl.com\/?p=4414"},"modified":"2023-05-22T20:30:11","modified_gmt":"2023-05-22T20:30:11","slug":"vulnerability-in-wordpress-google-analytics-plugin-reaches-3-million-websites","status":"publish","type":"post","link":"https:\/\/afreeurl.com\/?p=4414","title":{"rendered":"Vulnerability in WordPress Google Analytics plugin reaches +3 million websites"},"content":{"rendered":"<p><\/p>\n<p>The National Vulnerability Database announced that a popular Google Analytics WordPress plugin installed by more than 3 million was discovered to contain a Stored Cross-Site Scripting (XSS) vulnerability.<\/p>\n<h2>Stored XSS<\/h2>\n<p>A Cross-Site Scripting (XSS) attack generally occurs when a part of the website that accepts user input is insecure and allows unintended input such as scripts or links.<\/p>\n<p>The XSS vulnerability can be exploited to gain unauthorized access to a website and can lead to the theft of user data or a complete site takeover.<\/p>\n<p>The non-profit Open World Application Security Project (OWASP) describes <a href=\"https:\/\/owasp.org\/www-community\/attacks\/xss\/\" target=\"_blank\" rel=\"noopener\">how XSS vulnerability works<\/a>:<\/p>\n<p>&#8220;An attacker can use XSS to send a malicious script to an unsuspecting user. The end user&#8217;s browser has no way of knowing that the script is not to be trusted and will execute the script.<\/p>\n<p>Because it believes the script is from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information held by the browser and used with that site.<\/p>\n<p>A stored XSS, which is possibly worse, is one where the malicious script is stored on the website&#8217;s own servers.<\/p>\n<p>The plugin, MonsterInsights &#8211; Google Analytics Dashboard for WordPress, was found to have the stored XSS version of the vulnerability.<\/p>\n<h2>MonsterInsights \u2013 Google Analytics Dashboard for WordPress Vulnerability<\/h2>\n<p>The Google Analytics MonsterInsights plugin is installed on more than three million websites, making this vulnerability even more concerning.<\/p>\n<p><strong>WordPress security company Patchstack, which discovered the vulnerability, <a href=\"https:\/\/patchstack.com\/database\/vulnerability\/google-analytics-for-wordpress\/wordpress-google-analytics-by-monsterisights-plugin-8-14-0-cross-site-scripting-xss-vulnerability\" target=\"_blank\" rel=\"noopener\">details published<\/a>:<\/strong><\/p>\n<p>\u201cRafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Google Analytics by MonsterInsights Plugin.<\/p>\n<p>This could allow a malicious actor to inject malicious scripts such as redirects, ads, and other HTML payloads into your website, which will be executed when guests visit your site.<\/p>\n<p>This vulnerability has been fixed in version 8.14.1.<\/p>\n<p>The <a href=\"https:\/\/wordpress.org\/plugins\/google-analytics-for-wordpress\/#developers\" target=\"_blank\" rel=\"noopener\">MonsterInsights plugin changelog<\/a> in the WordPress plugin repository offered a somewhat vague explanation of the security patch:<\/p>\n<p>&#8220;Fixed: Fixed a PHP warning bug and added additional security reinforcement.&#8221;<\/p>\n<p>A &#8220;security hardening&#8221; is a term that can be applied to many tasks related to reducing attack vectors, such as removing the version number.<\/p>\n<p>WordPress has published a <a href=\"https:\/\/wordpress.org\/documentation\/article\/hardening-wordpress\/\" target=\"_blank\" rel=\"noopener\">full page on tightening security<\/a> which recommends security-enhancing tasks such as regular database backups, obtaining themes and plugins from trusted sources, and using strong passwords.<\/p>\n<p>All these activities are tightening security.<\/p>\n<p>This is why the use of the phrase &#8220;security hardening&#8221; is a general, generic term used for something as specific (and important) as patching an XSS security vulnerability, which could lead to a user to skip updating their plugin.<\/p>\n<h2>Recommended action<\/h2>\n<p>Patchstack recommends that all users of the MonsterInsights Analytics plugin immediately update their WordPress plugin to the latest version or at least version 8.14.1.<\/p>\n<p><strong>Read the US National Vulnerability Database announcement:<\/strong><\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-23999\" target=\"_blank\" rel=\"noopener\">CVE-2023-23999 Detail<\/a><\/p>\n<p><strong>Read Patchstack&#8217;s announcement:<\/strong><\/p>\n<p><a href=\"https:\/\/patchstack.com\/database\/vulnerability\/google-analytics-for-wordpress\/wordpress-google-analytics-by-monsterinsights-plugin-8-14-0-cross-site-scripting-xss-vulnerability\" target=\"_blank\" rel=\"noopener\">WordPress Google Analytics by MonsterInsights Plugin <= 8.14.0 is vulnerable to Cross Site Scripting (XSS)<\/a><\/p>\n<\/p>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.searchenginejournal.com\/monsterinsights-wordpress-plugin-vulnerability\/487510\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Vulnerability Database announced that a popular Google Analytics WordPress plugin installed by more than 3 million was discovered to contain a Stored Cross-Site Scripting (XSS) vulnerability. Stored XSS A Cross-Site Scripting (XSS) attack generally occurs when a part of the website that accepts user input is insecure and allows unintended input such as scripts or links. The XSS vulnerability can be exploited to gain unauthorized access to a website and can lead to&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4414","post","type-post","status-publish","format-standard","hentry","category-seo-news"],"_links":{"self":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/4414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4414"}],"version-history":[{"count":0,"href":"https:\/\/afreeurl.com\/index.php?rest_route=\/wp\/v2\/posts\/4414\/revisions"}],"wp:attachment":[{"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afreeurl.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}