A massive exploitation campaign is actively targeting WordPress websites running outdated versions of the GutenKit and Hunk Companion plugins. Attackers are exploiting three critical vulnerabilities — CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972 — that enable unauthenticated remote code execution, malicious plugin installation, and complete website takeover.
The campaign, which surged in October 2025, demonstrates how year-old unpatched vulnerabilities continue to endanger WordPress users globally. Threat actors are abusing unauthenticated REST API endpoints to upload weaponized plugins, establish persistent admin access, and exfiltrate data.
Weaponized payloads hosted on GitHub enable attackers to execute arbitrary code, delete files, or create fake administrator accounts. Even when full administrative access isn’t achieved, fallback exploitation techniques using vulnerable plugins like wp-query-console provide unauthenticated RCE (Remote Code Execution) capabilities.
This campaign underscores the importance of timely patching, plugin hygiene, and proactive threat monitoring across WordPress environments.
| CVE ID | Vulnerability Type | Affected Plugin | Severity |
|---|---|---|---|
| CVE-2024-9234 | Unauthenticated Arbitrary File Upload | GutenKit Plugin (v < 2.1.1) | Critical |
| CVE-2024-9707 | Unauthenticated Arbitrary Plugin Activation | Hunk Companion Plugin (v ≤ 1.8.4) | Critical |
| CVE-2024-11972 | Unauthenticated Arbitrary Plugin Activation (Bypass) | Hunk Companion Plugin (v ≤ 1.8.5) | Critical |
Technical Breakdown
Attackers exploit the install/activate routines of these plugins to bypass capability checks and gain unauthorized plugin-level control.
/wp-json/hc/v1/themehunk-import.One such ZIP archive, titled “up.zip,” contains obfuscated PHP scripts that can:
/wp-json/hc/v1/themehunk-import and similar endpoints.up.zip, oke.zip, or other unfamiliar plugin ZIP uploads./wp-content/plugins/up/).IPv4 Addresses:
13[.]218[.]47[.]110, 3[.]10[.]141[.]23, 52[.]56[.]47[.]51, 18[.]219[.]237[.]98, 18[.]116[.]40[.]45,
119[.]34[.]179[.]21, 194[.]87[.]29[.]184, 3[.]133[.]135[.]47, 3[.]141[.]28[.]47, 3[.]85[.]107[.]39,
3[.]148[.]175[.]195, 193[.]84[.]71[.]244, 3[.]147[.]6[.]140, 3[.]144[.]26[.]200, 193[.]233[.]134[.]136
IPv6 Addresses:
2600[:]1f16[:]234[:]9300[:]70c6[:]9e26[:]de1a[:]7696,
2600[:]1f16[:]234[:]9300[:]f71[:]bed2[:]11e5[:]4080
Domains:
ls.fatec[.]info, dari-slideshow[.]ru, zarjavelli[.]ru, korobushkin[.]ru, drschischka[.]at,
dpaxt[.]io, cta.imasync[.]com, catbox[.]moe
Malicious Plugin Directories and ZIPs:
/up/up.zip/background-image-cropper/background-image-cropper.zip/ultra-seo-processor-wp/ultra-seo-processor-wp.zip/oke/oke.zip/wp-query-console
| Tactic | Technique | Technique ID |
|---|---|---|
| Resource Development | Obtain Capabilities – Vulnerabilities | T1588, T1588.006 |
| Initial Access | Exploit Public-Facing Application | T1190 |
| Execution | Command and Scripting Interpreter | T1059 |
| Defense Evasion | Obfuscated Files or Information | T1027 |
| Discovery | File and Directory Discovery | T1083 |
Get through updates and upcoming events, and more directly in your inbox