Recently (wordpress is up-to-date) we experienced an exploit in our WordPress installation. Someone was able to successfully upload a spoofed bank site template to the upgrade directory (mentioned content: /wp-content/upgrade/wellsfargo/”). They somehow then were able to copy that directory to the root folder on the server (below the public_html folder).
Although we are unsure exactly how they accomplished this, the matter is..they were able to.
I have searched but have not been able to duplicate this problem elsewhere in existence (no one else has been posting about it that I have been able to find).
Something to consider.
- The topic ‘Auto-upgrade exploit’ is closed to new replies.