Netcrook Logo
👤 AUDITWOLF
🗓️ 25 Oct 2025   🌍 North America

Millions of WordPress Sites Stormed: Critical Plugin Flaws Unleash a Hacker Blitz

In just two days, cybercriminals exploited critical plugin vulnerabilities to target 8.7 million WordPress websites, exposing a fundamental weakness in the world’s most popular website platform.

Fast Facts

  • 8.7 million WordPress attack attempts were recorded over just 48 hours in early October 2024.
  • Attackers exploited critical flaws in GutenKit and Hunk Companion plugins, affecting tens of thousands of sites.
  • Three vulnerabilities, each rated at the highest danger level (CVSS 9.8), allowed hackers to take control remotely.
  • The flaws let attackers install malicious plugins and execute code as if they owned the website.
  • Wordfence, a major WordPress security provider, first reported the mass attack campaign.

The Perfect Storm: How Millions of Websites Were Laid Bare

Imagine a fortress city with open gates – that’s what 8.7 million WordPress sites became in early October, as hackers swept through exploiting critical cracks in popular plugins. The assault, swift and surgical, targeted vulnerabilities in GutenKit and Hunk Companion, two widely used add-ons that extend WordPress’s functionality. But these digital add-ons carried flaws so severe that security experts ranked them at the very top of the danger scale.

At the heart of the chaos were three vulnerabilities, cataloged as CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972. All three shared a common weakness: they failed to check who was knocking at the door. This oversight let attackers install any plugin - including malicious ones - without needing a password or any authorization. Once inside, hackers could run commands and take over the site, turning trusted pages into tools for scams, malware, or even larger cyber offensives.

Why Plugins Are Both Power and Peril

WordPress powers more than 40% of the world’s websites, from personal blogs to major businesses. Its secret weapon is its ecosystem of plugins - small software add-ons that provide everything from contact forms to e-commerce. But each plugin is also a potential weak spot. As this campaign shows, a single flaw can turn millions of sites into easy prey.

The vulnerabilities exploited here were found in the REST API endpoints of the plugins. Think of REST API as a backdoor for apps to talk to your site. If left unguarded, it becomes a welcome mat for attackers. The GutenKit flaw affected over 40,000 sites, while Hunk Companion’s issues threatened another 8,000. Combined, they created a massive attack surface ripe for exploitation.

Echoes of Attacks Past - And a Growing Industry Problem

This is far from the first time WordPress sites have been hit by plugin flaws. In 2021, the notorious “WP File Manager” bug let hackers compromise over 700,000 sites. Each wave of attacks chips away at trust in the platform and highlights the race between plugin developers and cybercriminals. As open-source software, WordPress relies on rapid community patching - but with thousands of plugins, keeping up is a Sisyphean task.

Security firms like Wordfence and Sucuri regularly report mass exploit campaigns, often linked to criminal groups seeking to hijack web traffic, steal data, or build botnets. Some analysts suggest that such vulnerabilities can even be leveraged in geopolitical conflicts, where control of online narratives and infrastructure is at stake.

For website owners and everyday users alike, the lesson is clear: the convenience of plugins comes with a hidden price. As hackers become more sophisticated, the margin for error shrinks. Vigilance, timely updates, and a skeptical eye for add-ons remain the best defense in a world where your website’s front door might be wide open - and you may never know until the enemy is inside.

WIKICROOK

  • WordPress: WordPress is a popular platform that lets users build and manage websites or blogs easily, without needing to know how to code.
  • Plugin: A plugin is a small software add-on that extends the features of a main application, but may also introduce new security vulnerabilities.
  • Vulnerability (CVE): A Vulnerability (CVE) is a publicly listed security flaw in software or hardware that attackers can exploit if left unpatched.
  • REST API: A REST API is a set of rules that lets different software systems communicate over the internet, acting like a translator between websites and apps.
  • Remote Code Execution (RCE): Remote Code Execution (RCE) is when an attacker runs their own code on a victim’s system, often leading to full control or compromise of that system.

AUDITWOLF AUDITWOLF
Cyber Audit Commander
← Back to news