Very bad, what plugins you write about … since yours was the source of infection.
There is nothing else – restore backup and update your plugin.
-
This reply was modified 3 years, 3 months ago by
emild.
Hi @martapaw
Ive already deleted both plugins. I do not have the system status with the plugin installed.
It is a little bit strange how the plugin did that and woocommerce security even did not noticed!
The problem still occur.
I’ve activated Flexible Checkout Fields and PRO version, I went to settings, and I’ve got two new users.
@martapaw
you take the matter seriously,
In addition to update, please provide a list of steps to get rid of the infection, the infection returns in case someone removes it manually without restoring the backup:
wp-content / uploads / 2020/02 delete woo-add-to-cart.zip
wp-content / plugins delete Woo-Add-To-Carts
deleting administrators
reset all fields in Flexible Checkout Fields
unfortunately you have no idea what you are writing about and dropping on other plugins, asking about the theme. It’s an unprofessional response to an infection.
-
This reply was modified 3 years, 3 months ago by
emild.
Hello All,
We will publish detailed step-by-step instructions soon. In the meantime, however, in short – if you have a backup before the problem occurred, the best solution would be to restore it + update the Flexible Checkout Fields plugin to version 2.3.2. If not, however, you should reset the settings of each section of the FCF fields, perform an update and check if the “Woo-Add-To-Carts” plug-in by “LinkFlowUsers” or other suspicious ones have been install, if yes, you need to delete them. Then you will need to delete the created additional administrative accounts from the user list level and check if additional files have been placed on the server.
Best regards,
Marta
@martapaw sorry but this is not a correct patch. current_user_can will check the permission but not the intention.
To do that, you have to add a nonce token. Without it, it’s now vulnerable to CSRF attack.
Please fix it asap with a WordPress nonce token, https://developer.wordpress.org/reference/functions/wp_verify_nonce/
@nintechnet maybe you should have give a GO for this patch :/
thanks
the same case like with latest themegrill vulnerability – no checks on admin-ajax call letting anybody to inject any script into page …
Hello All,
Thank you for your patience.
Please see our article with the instructions: https://www.wpdesk.net/blog/flexible-checkout-fields-security-issue/ about this issue.
@juliobox thank you. We provided the fastest solution to this issue. Further improvements are made in the background.
Best regards,
Marta