16.1 C
New York
Saturday, August 2, 2025

Pi-hole discloses information breach triggered by WordPress plugin flaw


Pi-hole discloses information breach triggered by WordPress plugin flaw

Pi-hole, a preferred network-level ad-blocker, has disclosed that donor names and e-mail addresses have been uncovered by a safety vulnerability within the GiveWP WordPress donation plugin.

Pi-hole acts as a DNS sinkhole, filtering out undesirable content material earlier than it reaches the customers’ gadgets. Whereas initially designed to run on Raspberry Pi single-board computer systems, it now helps varied Linux methods on devoted {hardware} or digital machines.

The group said that they first discovered of the incident on Monday, July 28, after donors started reporting that they have been receiving suspicious emails at addresses used solely for donations.

As defined in a Friday autopsy, the breach affected customers who donated by the Pi-hole web site’s donation kind to help improvement, exposing private info that was seen to anybody who considered the webpage’s supply code as a consequence of a GiveWP safety flaw.

The vulnerability stemmed from GiveWP, a WordPress plugin used to course of donations on the Pi-hole web site. The plugin inadvertently made donor info publicly accessible with out requiring authentication or particular entry privileges.

Whereas Pi-hole did not disclose the variety of affected prospects, the ‘Have I Been Pwned’ information breach notification service added the Pi-hole breach, saying that it impacted virtually 30,000 donors, with 73% of the uncovered data already in its database.

https://bsky.app/profile/haveibeenpwned.com/post/3lvca3viu322x

No monetary info uncovered

Pi-hole added that no donor monetary information was compromised, as bank card info and different cost particulars are dealt with instantly by Stripe and PayPal. It additionally clarified that the Pi-hole software program product itself was not affected in any method.

“We make it clear within the donation kind that we do not even require a sound title or e-mail handle, it is purely for customers to see and handle their donations,” Pi-hole stated. “Additionally it is essential to notice that Pi-hole the product is categorically not the topic of this breach. There isn’t any motion wanted from customers with a Pi-hole put in on their community.”

Though GiveWP launched a patch inside hours of the vulnerability being reported on GitHub, Pi-hole criticized the plugin developer’s response, citing a 17.5-hour delay earlier than notifying customers and what it described as inadequate acknowledgment of the safety flaw’s potential influence on donor names and e-mail addresses.

Pi-hole apologized to affected donors and acknowledged potential status harm stemming from this safety incident, saying that whereas the vulnerability was unforeseeable, they settle for accountability for the ensuing information breach.

“The names and e-mail addresses of anybody that had ever donated through our donation web page was there for the whole world to see (offered they have been savvy sufficient to proper click->View web page supply). Inside a few hours of this report, they’d patched the dangerous code and launched 4.6.1,” Pi-hole added in a weblog put up analyzing the incident.

“We take full duty for the software program we deploy. We positioned our belief in a widely-used plugin, and that belief was damaged.”

Malware focusing on password shops surged 3X as attackers executed stealthy Good Heist situations, infiltrating and exploiting crucial methods.

Uncover the highest 10 MITRE ATT&CK strategies behind 93% of assaults and learn how to defend in opposition to them.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles