{"id":2063,"date":"2020-05-13T18:17:54","date_gmt":"2020-05-13T16:17:54","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2063"},"modified":"2020-05-13T18:17:57","modified_gmt":"2020-05-13T16:17:57","slug":"les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/","title":{"rendered":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR"},"content":{"rendered":"\n<p>Depuis son introduction en 2003, <strong><a href=\"https:\/\/koddos.net\/blog\/zero-days-compromised-in-several-wordpress-plugins-by-hackers\/\">WordPress<\/a><\/strong> a maintenu sa constance en tant que plateforme de blogging la plus demand\u00e9e et la plus performante. Et en tant que plateforme de d\u00e9veloppement open source, elle a gagn\u00e9 des millions d&rsquo;adeptes en tant que solution de premier choix pour les d\u00e9veloppeurs web. Cependant, tout comme d&rsquo;autres plateformes et applications, les sites WordPress ont toujours \u00e9t\u00e9 victimes d&rsquo;attaques de cybercriminels.<\/p>\n\n\n\n<p>Il y a eu d&rsquo;autres incidents de piratage, les hackers profitant d&rsquo;une vuln\u00e9rabilit\u00e9 dans un <strong><a href=\"https:\/\/koddos.net\/blog\/researchers-say-wordpress-plugins-makes-affected-sites-vulnerable-to-attacks\/\">plugin WordPress<\/a><\/strong> pour cibler des sites web. L&rsquo;objectif de ces hackers a toujours \u00e9t\u00e9 d&rsquo;ex\u00e9cuter du code arbitraire et de compromettre des cibles non corrig\u00e9es. Cette fois-ci, l&rsquo;objectif est toujours le m\u00eame.<\/p>\n\n\n\n<p><strong>Les cyber-attaquants ont exploit\u00e9 le plugin WordPress Elementor<\/strong><\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 <strong><a href=\"https:\/\/cyware.com\/news\/attackers-hit-the-bulls-eye-exploit-popular-wordpress-plugins-606c5b88\">Cyware<\/a><\/strong> a not\u00e9 qu&rsquo;un plugin WordPress Elementor est devenu la derni\u00e8re victime de cyber-attaques car les hackers ont exploit\u00e9 une vuln\u00e9rabilit\u00e9 trouv\u00e9e dans le plugin.<\/p>\n\n\n\n<p>Les hackers ont utilis\u00e9 une faille d&rsquo;ex\u00e9cution de code \u00e0 distance pour t\u00e9l\u00e9charger des fichiers arbitraires sur des sites cibl\u00e9s en utilisant l&rsquo;acc\u00e8s d&rsquo;utilisateurs enregistr\u00e9s.<\/p>\n\n\n\n<p>Comme le plugin compte plus d&rsquo;un million d&rsquo;installations actives, la vuln\u00e9rabilit\u00e9 au sein de la plateforme a \u00e9t\u00e9 consid\u00e9r\u00e9e comme \u00ab\u00a0critique\u00a0\u00bb.<\/p>\n\n\n\n<p>Apr\u00e8s avoir compromis la faille, le hacker a maintenant la possibilit\u00e9 d&rsquo;installer des portes d\u00e9rob\u00e9es qui lui permettent de contr\u00f4ler le site web exploit\u00e9 et m\u00eame de le supprimer compl\u00e8tement. Le contr\u00f4le total pour effacer compl\u00e8tement un site est la raison pour laquelle l&rsquo;incident de piratage a \u00e9t\u00e9 class\u00e9 comme tr\u00e8s critique et dangereux.<\/p>\n\n\n\n<p>Cyware a signal\u00e9 que dans le cadre du piratage, certains sites WordPress avec des utilisateurs inconnus au niveau de l&rsquo;abonn\u00e9 ont pu \u00eatre infiltr\u00e9s. L&rsquo;entreprise de s\u00e9curit\u00e9 a conseill\u00e9 aux utilisateurs de rechercher un fichier nomm\u00e9 \u00ab\u00a0wp-xmlrpc.php\u00a0\u00bb, ce qui pourrait \u00eatre une forte indication que le site pourrait avoir \u00e9t\u00e9 pirat\u00e9.<\/p>\n\n\n\n<p><strong>Les patchs pour le plugin vuln\u00e9rable sonrt sortis<\/strong><\/p>\n\n\n\n<p>D\u00e9j\u00e0, la vuln\u00e9rabilit\u00e9 du plugin a \u00e9t\u00e9 corrig\u00e9e avec la sortie de la version 2.9.4, qui est disponible en t\u00e9l\u00e9chargement. Les utilisateurs peuvent \u00e9galement prot\u00e9ger leurs sites contre les menaces en t\u00e9l\u00e9chargeant la version 1.24.2, la derni\u00e8re version des Addons pour Elementor.<\/p>\n\n\n\n<p>Avec ce dernier incident de piratage, il semble que WordPress passe un temps fou \u00e0 tenir les hackers \u00e0 l&rsquo;\u00e9cart. Et en tant que plateforme open source, il ne sera peut-\u00eatre pas facile de rendre les millions de plugins de la plateforme compl\u00e8tement invuln\u00e9rables.<\/p>\n\n\n\n<p><strong>WordPress, constamment cibl\u00e9e par les hackers<\/strong><\/p>\n\n\n\n<p>Les hackers cherchent toujours \u00e0 exploiter n&rsquo;importe quelle application pour voir ce qu&rsquo;elle leur r\u00e9serve pour leurs gains douteux. Leurs cibles sont donc toujours de <strong><a href=\"https:\/\/www.developeronrent.com\/blogs\/hackers-target-wordpress\">mettre en \u0153uvre des menaces potentielles et d&rsquo;injecter des logiciels malveillants<\/a><\/strong>. Ils sont toujours pr\u00eats \u00e0 tirer profit des vuln\u00e9rabilit\u00e9s des applications pour leur infliger des dommages et compromettre des sites.<\/p>\n\n\n\n<p>La principale raison pour laquelle WordPress continue d&rsquo;\u00eatre la cible de nombreux hackers est que la plateforme est le constructeur de sites web le plus populaire, puisqu&rsquo;elle alimente 31% de tous les sites web. Ce pourcentage signifie qu&rsquo;il y a des centaines de millions de sites web qui sont d\u00e9velopp\u00e9s avec WordPress.<\/p>\n\n\n\n<p>Au d\u00e9but du mois de mars de cette ann\u00e9e, <strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/massive-campaign-targets-900-000-wordpress-sites-in-a-week\/\">plus de 900 000 sites WordPress ont \u00e9t\u00e9 infect\u00e9s<\/a><\/strong>, les attaquants ayant install\u00e9 des portes d\u00e9rob\u00e9es ou redirig\u00e9 les visiteurs vers des sites malveillants.<\/p>\n\n\n\n<p>Selon le rapport, l&rsquo;attaque a \u00e9t\u00e9 perp\u00e9tr\u00e9e par un acteur qui a utilis\u00e9 24 000 adresses IP pour envoyer une requ\u00eate malveillante aux sites victimes.<\/p>\n\n\n\n<p>Au d\u00e9but du mois de f\u00e9vrier, deux plugins WordPress populaires, ThermGrill Demo Importer et ThemeREX Addons, <strong><a href=\"https:\/\/www.securityweek.com\/wordpress-websites-hacked-vulnerabilities-two-themes-plugins\">ont \u00e9t\u00e9 exploit\u00e9s par des hackers<\/a><\/strong>.<\/p>\n\n\n\n<p>Une soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9, WebARX, a r\u00e9v\u00e9l\u00e9 la vuln\u00e9rabilit\u00e9 du plugin ThemeGrill. Elle a d\u00e9clar\u00e9 que le plugin avait une faille qui \u00e9tait exploit\u00e9e pour acc\u00e9der \u00e0 la zone d&rsquo;administration et effacer la base de donn\u00e9es du site. La vuln\u00e9rabilit\u00e9 a affect\u00e9 plus de 200 000 sites web lorsqu&rsquo;elle a \u00e9t\u00e9 expos\u00e9e. D&rsquo;autres <strong><a href=\"https:\/\/koddos.net\/blog\/several-wordpress-sites-compromised-by-malicious-codes\/\">sites WordPress<\/a><\/strong> ont \u00e9t\u00e9 exploit\u00e9s de mani\u00e8re notable par des hackers rien que cette ann\u00e9e.<\/p>\n\n\n\n<p>De plus, de nombreux sites WordPress sont h\u00e9berg\u00e9s sur un serveur infect\u00e9. Ces sites seraient toujours vuln\u00e9rables aux attaques.<\/p>\n\n\n\n<p>Une autre raison est le fait que WordPress n&rsquo;a pas de contr\u00f4le sur la plupart des plugins que les propri\u00e9taires de sites installent. Par cons\u00e9quent, certains de ces plugins peuvent laisser une faille ou une vuln\u00e9rabilit\u00e9, ce qui rendra tous les sites qui ont t\u00e9l\u00e9charg\u00e9 le plugin poreux \u00e0 l&rsquo;attaque. C&rsquo;est exactement ce qui s&rsquo;est pass\u00e9 dans cette attaque o\u00f9 plus d&rsquo;un million de sites ayant t\u00e9l\u00e9charg\u00e9 le plugin Elementor se sont retrouv\u00e9s vuln\u00e9rables.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis son introduction en 2003, WordPress a maintenu sa constance en tant que plateforme de blogging la plus demand\u00e9e et la plus performante. Et en tant que plateforme de d\u00e9veloppement open source, elle a gagn\u00e9 des millions d&rsquo;adeptes en tant que solution de premier choix pour les d\u00e9veloppeurs web. Cependant, tout comme d&rsquo;autres plateformes et &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2064,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Depuis son introduction en 2003, WordPress a maintenu sa constance en tant que plateforme de blogging la plus demand\u00e9e et la plus performante. Et en tant que plateforme de d\u00e9veloppement open source, elle a gagn\u00e9 des millions d&rsquo;adeptes en tant que solution de premier choix pour les d\u00e9veloppeurs web. Cependant, tout comme d&rsquo;autres plateformes et &hellip; Continue reading LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-13T16:17:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-13T16:17:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR\",\"datePublished\":\"2020-05-13T16:17:54+00:00\",\"dateModified\":\"2020-05-13T16:17:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/\"},\"wordCount\":870,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/\",\"name\":\"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-05-13T16:17:54+00:00\",\"dateModified\":\"2020-05-13T16:17:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS","og_description":"Depuis son introduction en 2003, WordPress a maintenu sa constance en tant que plateforme de blogging la plus demand\u00e9e et la plus performante. Et en tant que plateforme de d\u00e9veloppement open source, elle a gagn\u00e9 des millions d&rsquo;adeptes en tant que solution de premier choix pour les d\u00e9veloppeurs web. Cependant, tout comme d&rsquo;autres plateformes et &hellip; Continue reading LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-05-13T16:17:54+00:00","article_modified_time":"2020-05-13T16:17:57+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR","datePublished":"2020-05-13T16:17:54+00:00","dateModified":"2020-05-13T16:17:57+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/"},"wordCount":870,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/","name":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","datePublished":"2020-05-13T16:17:54+00:00","dateModified":"2020-05-13T16:17:57+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-exploitent-une-vulnerabilite-dans-le-plugin-de-wordpress-elementor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS EXPLOITENT UNE VULN\u00c9RABILIT\u00c9 DANS LE PLUGIN DE WORDPRESS ELEMENTOR"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/05\/A-Hacking-Attack-Involving-WordPress-Plugins-Is-Targeting-Vulnerable-Websites.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-xh","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2063"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2063\/revisions"}],"predecessor-version":[{"id":2065,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2063\/revisions\/2065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2064"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}