Home > News > Urgent Alert 🚨: Jupiter X Core Plugin Flaws Expose 170K Sites!

Urgent Alert 🚨: Jupiter X Core Plugin Flaws Expose 170K Sites!


Jupiter X Core Plugin: Urgent Security Risks Demand Immediate Attention

The Jupiter X Core plugin, a tool commonly integrated into WordPress websites, recently unveiled glaring security vulnerabilities. Used by more than 170,000 websites, this plugin poses a significant risk unless immediate actions are taken. With flaws that could allow hackers to hijack accounts and upload files sans authentication, this issue needs immediate attention. Here's an in-depth look at what makes the Jupiter X Core plugin a ticking time bomb, as well as what you can do about it.

The Importance of the Jupiter X Core Plugin

WordPress is one of the most popular Content Management Systems (CMS) globally, powering around 40% of the internet's websites. In this ecosystem, plugins like the Jupiter X Core are crucial. They provide ease-of-use and versatility, with this particular plugin offering a robust visual editor and facilitating WooCommerce integrations. Here's more information on the WordPress ecosystem (source) and the official Jupiter X Core plugin page (source).

Two Major Flaws Exposed

According to security researchers, the Jupiter X Core plugin has been found to have two significant vulnerabilities:

Vulnerability 1: CVE-2023-38388

The first flaw, designated as CVE-2023-38388, allows unauthenticated users to upload files onto the affected server. This defect could potentially result in the execution of arbitrary code, compromising the website entirely. This flaw has a severity score of 9.0 out of 10, and it primarily affects plugin versions 3.3.5 or older. Thankfully, WordPress developers have patched this bug in their recent update to version 3.3.8. More details about the CVE-2023-38388 vulnerability can be found on the official CVE website (source).

Vulnerability 2: CVE-2023-38389

The second vulnerability, CVE-2023-38389, is even more alarming. It allows users, without requiring any form of authentication, to take over any WordPress account if they know the email address connected to it. This flaw has been rated 9.8 out of 10 in terms of its severity and impacts all versions of the Jupiter X Core plugin from 3.3.8 and earlier. The good news is that the admins have addressed this issue by releasing version 3.4.3 of the plugin.

image Β© 2024. all rights reserved.

The Technical Underbelly: What Went Wrong

The issues stem from significant lapses in the plugin's core functionalities. For instance, the first flaw is attributable to no authentication checks within the plugin’s file upload function. After recognizing this lapse, the vendor has resolved to introduce a check function that adds a secondary layer of review, preventing the upload of malicious files.

The second vulnerability can be traced back to a weakness in the plugin’s ajax_handler function in the Facebook login method. This function allowed unauthorized users to set any WordPress user's ‘social-media-user-facebook-id' meta with any value via the ‘set_user_facebook_id' prompt. This enabled the attackers to misuse this function to authenticate any registered user on the site, provided they entered a valid email address.

Preventive Measures

Given the severity of these vulnerabilities, website administrators should act immediately to install the latest updates. Here's the official update guide by WordPress that can help in the seamless update of plugins (source). Also, constant monitoring is required to check for any unusual activities. Various cybersecurity platforms offer this service, such as Sucuri and iThemes Security.

The Wider Impact on Cybersecurity

It’s crucial to remember that plugins like Jupiter X Core play an enormous role in website functionality. A single vulnerability could be a loophole for broader attacks, impacting not just one website but the entire interconnected web. WordPress admins are strongly advised to always keep plugins up-to-date and to follow best security practices as outlined in resources like WordPress Codex.

image Β© 2024. all rights reserved.

My Conclusion

While researchers have not found an ongoing exploit of these critical vulnerabilities in the Jupiter X Core plugin yet, this does not mean website admins can be complacent. The clock is ticking, and immediate action is required to update to secure versions of the plugin. By taking proactive measures, you can ensure that your website remains secure against these glaring vulnerabilities.


What is the Jupiter X Core plugin?

The Jupiter X Core plugin is a popular WordPress plugin used by over 170,000 websites. It provides a powerful visual editor and is often used for setting up WooCommerce and WordPress websites.

Why is this plugin in the news?

The plugin has recently been found to contain two significant security vulnerabilities that could allow hackers to hijack WordPress accounts and upload malicious files without authentication.

What are the vulnerabilities identified?

There are two major vulnerabilities:
CVE-2023-38388: Allows unauthenticated users to upload files.
CVE-2023-38389: Enables unauthenticated users to take over any WordPress user account if they know the email address.

How severe are these vulnerabilities?

The first vulnerability, CVE-2023-38388, has a severity score of 9.0 out of 10. The second vulnerability, CVE-2023-38389, has a severity score of 9.8 out of 10. Both are considered to be extremely severe.

Have these vulnerabilities been fixed?

Yes, WordPress developers have released patches for these vulnerabilities. CVE-2023-38388 was patched in version 3.3.8, and CVE-2023-38389 was fixed in version 3.4.3.

What should website administrators do?

Website administrators should immediately update to the latest version of the Jupiter X Core plugin. Additionally, constant monitoring is recommended to detect any unusual activities.

Are there any known exploits in the wild?

As of now, there are no known ongoing exploits utilizing these vulnerabilities. However, given the severity of the vulnerabilities, it is advised to take immediate action.

What could potentially happen if these vulnerabilities are exploited?

If exploited, these vulnerabilities can allow hackers to upload arbitrary code or files, thereby compromising the security of the website. Furthermore, attackers could gain unauthorized access to user accounts.

What are some recommended resources for securing my WordPress site?

You can refer to the official update guide by WordPress for a seamless update of plugins. Cybersecurity platforms like Sucuri and iThemes Security also offer monitoring and protection services.

Where can I find more information about these vulnerabilities?

You can get more details from the Common Vulnerabilities and Exposures (CVE) website, as well as from the official Jupiter X Core plugin page on ThemeForest.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.