{"id":981,"date":"2020-08-05T00:53:34","date_gmt":"2020-08-05T04:53:34","guid":{"rendered":"https:\/\/websitepsychiatrist.com\/?p=981"},"modified":"2025-03-20T09:37:19","modified_gmt":"2025-03-20T13:37:19","slug":"critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder","status":"publish","type":"post","link":"https:\/\/websitepsychiatrist.com\/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder\/","title":{"rendered":"Critical Vulnerability Exposes over 700,000 Sites Using Divi, Extra, and Divi Builder"},"content":{"rendered":"\n<p>Wordfence&#8217;s Threat Intelligence team discovered a vulnerability present in two themes by\u00a0Elegant Themes, Divi and Extra, as well as Divi Builder, a WordPress plugin. Combined, these products are installed on an estimated 700,000 sites. This flaw gave authenticated attackers, with contributor-level or above capabilities, the ability to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable site\u2019s server.<\/p>\n\n\n\n<p>This flaw made it possible for authenticated users with the\u00a0<code>edit_posts<\/code>\u00a0capability, like contributors, editors, and authors, to upload arbitrary files. An attacker could easily upload malicious PHP files and access them from the uploads directory. This could ultimately result in remote code execution and complete compromise of a vulnerable site\u2019s hosting account.<\/p>\n\n\n\n<p>Fortunately, Elegant Themes was very quick to respond and release a patch that not only prevented all files except .json files from being uploaded, but also ensured that files would be sufficiently deleted at any stage of the process once no longer used.<\/p>\n\n\n\n<p>As long as you have supplied your Elegant Themes Username and API key on your WordPress site, then you can take care of your updates directly in the updates area on your site. To do so, log into your site, and navigate to the \u201cUpdates\u201d area. Select the Elegant Themes product you would like to update and just click \u201cUpdate Plugin\u201d or \u201cUpdate Theme\u201d depending on which product you are updating.<\/p>\n\n\n\n<p>Also, please note that Elegant Themes has made this patch available to users, even if your account is expired.<\/p>\n\n\n\n<p>If you are unable to update fully, you can install\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.elegantthemes.com\/members-area\/security\/august-2020\/\" target=\"_blank\" class=\"rank-math-link\">Elegant Themes Security Patcher Plugin<\/a>\u00a0that will temporarily patch the vulnerability until you are able to do a complete update. <\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.wordfence.com\/blog\/2020\/08\/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.wordfence.com\/blog\/2020\/08\/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder\/<\/a><\/p>\n\n\n\n<p style=\"background-color:#f5f5f5\" class=\"has-background\">Unfortunately, you have to have a paid account to be able to access the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.elegantthemes.com\/members-area\/security\/august-2020\/\" target=\"_blank\">Elegant Themes Security Patcher Plugin<\/a>, it seems that this file should not be behind a paywall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wordfence&#8217;s Threat Intelligence team discovered a vulnerability present in two themes by\u00a0Elegant Themes, Divi and Extra, as well as Divi Builder, a WordPress plugin. Combined, these products are installed on an estimated 700,000 sites. This flaw gave authenticated attackers, with contributor-level or above capabilities, the ability to upload arbitrary files, including PHP files, and achieve &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Critical Vulnerability Exposes over 700,000 Sites Using Divi, Extra, and Divi Builder\" class=\"read-more button\" href=\"https:\/\/websitepsychiatrist.com\/critical-vulnerability-exposes-over-700000-sites-using-divi-extra-and-divi-builder\/#more-981\" aria-label=\"Read more about Critical Vulnerability Exposes over 700,000 Sites Using Divi, Extra, and Divi Builder\">Read more<\/a><\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-981","post","type-post","status-publish","format-standard","hentry","category-articles","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"_links":{"self":[{"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/posts\/981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/comments?post=981"}],"version-history":[{"count":1,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/posts\/981\/revisions"}],"predecessor-version":[{"id":982,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/posts\/981\/revisions\/982"}],"wp:attachment":[{"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/media?parent=981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/categories?post=981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitepsychiatrist.com\/api\/wp\/v2\/tags?post=981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}