1. SEJ
  2.  ⋅ 
  3. News

Facebook for WordPress Plugin Vulnerability Targets +500,000 Sites

Two exploits affecting the popular Facebook for WordPress plugin can lead to a total site takeover and malicious backdoors

Facebook for WordPress Plugin Vulnerability

Two vulnerabilities were patched in the Facebook for WordPress Plugin. The exploits could allow a malicious attacker to install backdoors, create administrator level accounts and stage a complete site takeover.

Facebook for WordPress Exploit

Facebook for WordPress plugin, installed in over 500,000 websites, is a site visitor tracking plugin for advertisers that use Facebook ads. It allows advertisers to track the visitor journey and optimize their ad campaigns.

One of the exploits was discovered in December 2020. The other flaw was introduced in January 2021 as part of a rebranding and code update to the plugin.

PHP Object Injection Vulnerability

This kind of exploit depends on a flaw that inadequately sanitizes uploads which in turn allows an attacker to perform a variety of attacks such as code injection.

In this specific attack a hacker could use the compromised plugin to upload a file and proceed to a remote code execution.

The particulars of this vulnerability could also allow the attacker to take advantage of other plugins containing the vulnerability.

According to Wordfence:

“This meant that an attacker could generate a PHP file new.php in a vulnerable site’s home directory… The PHP file contents could be changed to anything… which would allow an attacker to achieve remote code execution.

Note that the presence of a full POP chain also meant that any other plugin with an object injection vulnerability, including those that did not require knowledge of the site’s salts and keys, could potentially be used to achieve remote code execution as well if it was installed on a site with the Facebook for WordPress plugin.”

Cross-Site Request Forgery

A cross site request forgery exploit is a type that requires a victim with administrator level credentials to a WordPress site to perform an action (like click on a link) which would then lead to an attack that takes advantage of the administrators high level credentials.

An attacker could gain access to private metric data or stage a complete site takeover.

Wordfence describes it like this:

“The action could be used by an attacker to update the plugin’s settings to point to their own Facebook Pixel console and steal metric data for a site.

Worse yet, since there was no sanitization on the settings that were stored, an attacker could inject malicious JavaScript into the setting values.

These values would then be reflected on the settings page, causing the code to execute in a site administrator’s browser while accessing the settings page.

Ultimately, this code could be used to inject malicious backdoors into theme files or create new administrative user accounts that could be used for complete site takeover.”

Update Recommended

It is recommended that all users immediately update their plugin to the latest version (currently Version 3.0.5). Facebook for WordPress version 3.0.4 is fully patched but version 3.0.5 is the most up to date version of the plugin.


Two Vulnerabilities Patched in Facebook for WordPress Plugin

Facebook for WordPress Changelog

SEJ STAFF Roger Montti Owner - at

I have 25 years hands-on experience in SEO and have kept on  top of the evolution of search every step ...

Facebook for WordPress Plugin Vulnerability Targets +500,000 Sites

Subscribe To Our Newsletter.

Conquer your day with daily search marketing news.