CVE-2023-6751

7.3 HIGH

📋 TL;DR

The Hostinger WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to enable or disable maintenance mode on affected websites. This affects all WordPress sites using Hostinger plugin versions 1.9.7 and earlier. Attackers can disrupt website availability without requiring any credentials.

💻 Affected Systems

Products:
  • Hostinger WordPress Plugin
Versions: All versions up to and including 1.9.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Hostinger plugin active. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enable maintenance mode indefinitely, causing extended website downtime and business disruption, potentially combined with other attacks during the outage.

🟠

Likely Case

Temporary website unavailability through maintenance mode activation, causing service disruption and potential reputational damage.

🟢

If Mitigated

Minimal impact if plugin is patched or disabled; maintenance mode changes would be prevented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint; no authentication required. Exploitation trivial for attackers with basic web knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.8

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3010008%40hostinger%2Ftrunk&old=3010004%40hostinger%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Hostinger plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.9.8+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Hostinger Plugin

all

Temporarily deactivate the vulnerable plugin until patching is possible

wp plugin deactivate hostinger

Web Application Firewall Rule

all

Block requests to the vulnerable publish_website endpoint

Block HTTP POST requests to */wp-admin/admin-ajax.php with action=publish_website

🧯 If You Can't Patch

  • Implement IP-based access restrictions to WordPress admin areas
  • Deploy a web application firewall with rules blocking unauthorized maintenance mode changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Hostinger plugin version. If version is 1.9.7 or lower, system is vulnerable.

Check Version:

wp plugin get hostinger --field=version

Verify Fix Applied:

Confirm Hostinger plugin version is 1.9.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=publish_website from unauthenticated users
  • Sudden maintenance mode activation without administrator action

Network Indicators:

  • HTTP POST requests to admin-ajax.php with publish_website parameter from external IPs

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="publish_website" AND user="-"

🔗 References

📤 Share & Export