Experts from the security firm WebARX have discovered a serious flaw in the WordPress theme plugin ThemeGrill Demo Importer with over 200,000 active installs. The vulnerability could be exploited to wipe sites running the vulnerable versions of the plugin and gain admin access to the site.
ThemeGrill Demo Importer is a popular plugin that allows WordPress website administrators to import demo content, widgets and settings for ThemeGrill theme plugin with just one click.
The critical flaw, that existed for the past three years, affects versions 1.3.4 through 1.6.1 of the plugin and could be exploited only against those websites where the ThemeGrill theme plugin is activated.
Once the attackers have exploited the vulnerability, the database will be populated with default settings and data. If the database includes a user named “admin,” the exploitation of the flaw will allow the attacker to automatically log-in as an administrator.
“The prerequisite is that there must be a theme installed and activated that was published by ThemeGrill.” reads the analysis published by WebARX. “In order to be automatically logged in as an administrator, there must be a user called “admin” in the database. Regardless of this condition, the database will still be wiped to its default state.”
The bad news is that the exploitation of the issued that affects the ThemeGrill plugin can be automated.
The development team behind the ThemeGrill addressed the flaw with the release of version 1.6.2.
Below the timeline
Recently the issues in
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.