Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability
Sep 14, 2022
 A zero-day flaw in the latest version of a WordPress premium plugin known as  WPGateway  is being actively exploited in the wild, potentially allowing malicious actors to completely take over affected sites.  Tracked as  CVE-2022-3180  (CVSS score: 9.8), the issue is being weaponized to add a malicious administrator user to sites running the WPGateway plugin, WordPress security company Wordfence noted.  "Part of the plugin functionality exposes a vulnerability that allows unauthenticated attackers to insert a malicious administrator," Wordfence researcher Ram Gall  said  in an advisory.   WPGateway is billed as a means for site administrators to install, backup, and clone WordPress plugins and themes from a unified dashboard.  The most common indicator that a website running the plugin has been compromised is the presence of an administrator with the username "rangex."  Additionally, the appearance of requests to "//wp-content/plugins/wpgateway/wpgateway-w...