WordPress.org has announced a new account security measure that requires accounts with the ability to update plugins and themes to enable mandatory two-factor authentication (2FA).
The execution expected to enter into force on 1 October 2024.
“Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress sites worldwide,” the developers of the self-hosted, open-source content management system (CMS). said.
“The security of these accounts is important to prevent unauthorized access and to maintain the security and trust of the WordPress.org community.”
In addition to requiring mandatory 2FA, WordPress.org said it is introducing so-called SVN passwords, which refers to a special password for making changes.
This, it says, is an attempt to introduce a new layer of security by separating users’ access to code commits from their WordPress.org account credentials.
“This password functions as the password of an application or additional user account,” the team said. “It protects your master password from disclosure and allows you to easily revoke SVN access without changing your WordPress.org credentials.”
WordPress.org also noted that technical limitations prevented 2FA from being applied to existing code repositories, leading it to opt for “a combination of account-level two-factor authentication, high-entropy SVN passwords, and other deployments. time-based security features (such as release confirmations).”
These measures are seen as a way to counter scenarios where an attacker could seize control of a publisher’s account, thereby injecting malicious code into legitimate plugins and themes, leading to large-scale supply chain attacks.
Disclosure occurs as Sucuri warned continues ClearFake Company targeting WordPress sites that aim to distribute a hijacker called RedLine, tricking site visitors into manually running PowerShell code to fix a web page rendering problem.
Attackers have also been seen using infected PrestaShop e-commerce sites to deploy a credit card skimmer to collect financial information entered on checkout pages.
“Outdated software is a prime target for attackers who exploit vulnerabilities in old plugins and themes,” security researcher Ben Martin said. “Weak administrator passwords are a gateway for attackers.”
Users are encouraged to keep their plugins and themes up-to-date, deploy a Web Application Firewall (WAF), periodically review administrator accounts, and monitor website files for unauthorized changes.