WordPress plug-in vulnerability gives hackers Google Search Console access

Hack could expose 300,000 WordPress sites to back-hat SEO or complete takedowns

Earlier this week, WordFence announced its threat intelligence team discovered a vulnerability within Site Kit by Google, a WordPress plugin that provides website owners easy access to critical Google tools and insights. The plug-in is currently installed on upward of 300,000 WordPress sites. The vulnerability allows for any authenticated user to become a Google Search Console owner for sites running the Google-owned plugin. 

WordFence filed a security issue report notifying Google of the issue on April 21, 2020. Google released a patch on May 7, 2020.

The Site Kit vulnerability is a critical security issue, as it could allow attackers to obtain owner access to a site within the Google Search Console. Such high-level access would allow hackers to modify sitemaps, remove pages from Google search engine results and even facilitate black-hat SEO campaigns. For many hackers, the ability to carry out such campaigns is particularly attractive.

Further, should a hacker obtain access to a website’s Google Search Console, they could also do things such as gaining access to a site’s Google Analytics data.

All in all, hackers being provided with access to a site’s Google Search Console has the potential to hurt a website’s search engine ranking. It could also have an impact on how websites and organizations compete when it comes to their search rankings and overall reputations on the web.

At this time, all Site Kit users have been urged to update the plug-in to the 1.8.0 version. Doing so will help to protect their websites against this critical vulnerability. According to Bleeping Computer, while nearly 200,000 website owners have updated Site Kit since the patch was released, over 100,000 sites have yet to put the patch in place. Meaning, many WordPress websites remain exposed to hackers looking to capitalize on this vulnerability.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021