Saturday, May 16, 2026
HomeLocal SEOWordPress Google Fonts Plugin Vulnerability Impacts Up To +300,000 Websites

WordPress Google Fonts Plugin Vulnerability Impacts Up To +300,000 Websites

[ad_1]

A vulnerability rated as Excessive was lately patched in a Google Fonts optimization plugin for WordPress, permitting attackers to delete complete directories and add malicious scripts.

OMGF | GDPR/DSGVO Compliant WordPress Plugin

The plugin, OMGF | GDPR/DSGVO Compliant, Quicker Google Fonts. Straightforward., optimizes using Google Fonts to scale back web page velocity affect and can also be GDPR compliant, making it helpful for customers within the European Union trying to implement Google Fonts.

Screenshot of Wordfence Vulnerability Ranking

WordPress Google Fonts Plugin Vulnerability Affects Up To +300,000 Sites

Vulnerability

The vulnerability is especially regarding as a result of it permits unauthenticated attackers. “Unauthenticated” implies that an attacker doesn’t should be registered on the web site or have any degree of credentials.

The vulnerability is described as enabling unauthenticated listing deletion and permitting the add of Cross-Website Scripting (XSS) payloads.

Cross-Website Scripting (XSS) is a sort of assault the place a malicious script is uploaded to an internet site server, which may then be used to remotely assault the browsers of any guests. This can lead to accessing a consumer’s cookies or session info, enabling the attacker to imagine the privilege degree of that consumer visiting the location.

The reason for the vulnerability, as recognized by Wordfence researchers, is an absence of a functionality examine – a safety characteristic that checks whether or not a consumer has entry to a selected characteristic of a plugin, on this case, an admin-level characteristic.

An official WordPress developer web page for plugin makers says this about functionality checking:

“Person capabilities are the precise permissions that you just assign to every consumer or to a Person function.

For instance, Directors have the “manage_options” functionality which permits them to view, edit and save choices for the web site. Editors alternatively lack this functionality which can forestall them from interacting with choices.

These capabilities are then checked at varied factors inside the Admin. Relying on the capabilities assigned to a job; menus, performance, and different points of the WordPress expertise could also be added or eliminated.

As you construct a plugin, be sure that to run your code solely when the present consumer has the required capabilities.”

Wordfence describes the reason for the vulnerability:

“…is weak to unauthorized modification of information and Saved Cross-Website Scripting attributable to a lacking functionality examine on the update_settings() perform hooked through admin_init in all variations as much as, and together with, 5.7.9.”

Wordfence additionally states that earlier updates tried to shut the safety hole however considers model 5.7.10 to be essentially the most safe model of the plugin.

Learn the Wordfence vulnerability warning:

OMGF | GDPR/DSGVO Compliant, Quicker Google Fonts. Straightforward. <= 5.7.9 – Lacking Authorization to Unauthenticated Listing Deletion and Cross-Website Scripting

Featured Picture by Shutterstock/Nikulina Tatiana

[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments