WordPress plug-in vulnerability gives hackers Google Search Console access

Hack could expose 300,000 WordPress sites to back-hat SEO or complete takedowns

WordPress app icon on iOS device

Earlier this week, WordFence announced its threat intelligence team discovered a vulnerability within Site Kit by Google, a WordPress plugin that provides website owners easy access to critical Google tools and insights. The plug-in is currently installed on upward of 300,000 WordPress sites. The vulnerability allows for any authenticated user to become a Google Search Console owner for sites running the Google-owned plugin. 

Advertisement - Article continues below

WordFence filed a security issue report notifying Google of the issue on April 21, 2020. Google released a patch on May 7, 2020.

The Site Kit vulnerability is a critical security issue, as it could allow attackers to obtain owner access to a site within the Google Search Console. Such high-level access would allow hackers to modify sitemaps, remove pages from Google search engine results and even facilitate black-hat SEO campaigns. For many hackers, the ability to carry out such campaigns is particularly attractive.

Further, should a hacker obtain access to a website’s Google Search Console, they could also do things such as gaining access to a site’s Google Analytics data.

All in all, hackers being provided with access to a site’s Google Search Console has the potential to hurt a website’s search engine ranking. It could also have an impact on how websites and organizations compete when it comes to their search rankings and overall reputations on the web.

Advertisement - Article continues below
Advertisement - Article continues below

At this time, all Site Kit users have been urged to update the plug-in to the 1.8.0 version. Doing so will help to protect their websites against this critical vulnerability. According to Bleeping Computer, while nearly 200,000 website owners have updated Site Kit since the patch was released, over 100,000 sites have yet to put the patch in place. Meaning, many WordPress websites remain exposed to hackers looking to capitalize on this vulnerability.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now


ethical hacking

Developer scores $100,000 bounty from Apple for exposing a critical vulnerability

1 Jun 2020

Hackers are wreaking havoc on Google’s Cloud infrastructure

1 Jun 2020

ZLoader malware returns as a coronavirus phishing scam

27 May 2020

AnarchyGrabber hack steals Discord tokens, IDs and passwords

27 May 2020

Most Popular

network attached storage (NAS)

Western Digital accused of sneaking inferior SMR tech into NAS drives

1 Jun 2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020