{"id":5047,"date":"2023-05-27T04:05:00","date_gmt":"2023-05-27T02:05:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=5047"},"modified":"2023-05-28T19:16:50","modified_gmt":"2023-05-28T17:16:50","slug":"des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/","title":{"rendered":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS"},"content":{"rendered":"\n<p>Des hackers ont lanc\u00e9 des attaques continues <strong><a href=\"https:\/\/blog.koddos.net\/a-hacking-attack-involving-wordpress-plugins-is-targeting-vulnerable-websites\/\">contre des sites WordPress<\/a><\/strong>. Ces attaques visent une vuln\u00e9rabilit\u00e9 XSS (cross-site scripting) stock\u00e9e et non authentifi\u00e9e dans un plugin WordPress de consentement aux cookies connu sous le nom de Beautiful Cookie Consent Banner (Banni\u00e8re de consentement aux cookies). Le plugin compte plus de 40 000 installations actives.<\/p>\n\n\n\n<p><strong>Des hackers utilisent des exploits du plugin de consentement aux cookies pour mener des attaques<\/strong><\/p>\n\n\n\n<p>Les acteurs malveillants \u00e0 l&rsquo;origine de ces attaques ont cibl\u00e9 une vuln\u00e9rabilit\u00e9 XSS. Lorsque les hackers lancent une attaque en utilisant une vuln\u00e9rabilit\u00e9 XSS, ils installent des scripts JavaScript malveillants dans les sites web vuln\u00e9rables. Ces scripts malveillants sont inject\u00e9s dans les sites web vuln\u00e9rables, o\u00f9 ils sont ensuite ex\u00e9cut\u00e9s dans les navigateurs web des visiteurs du site.<\/p>\n\n\n\n<p>L&rsquo;exploitation de ces vuln\u00e9rabilit\u00e9s peut causer des dommages importants aux appareils cibl\u00e9s. Parmi les cons\u00e9quences de ces attaques, on peut citer l&rsquo;acc\u00e8s non autoris\u00e9 d&rsquo;acteurs malveillants \u00e0 des informations sensibles. Ils pourraient \u00e9galement d\u00e9tourner des sessions en ligne et d\u00e9clencher des infections de logiciels malveillants par le biais de redirections vers des sites malveillants.<\/p>\n\n\n\n<p>L&rsquo;un des principaux effets d&rsquo;une exploitation d&rsquo;une <strong><a href=\"https:\/\/blog.koddos.net\/hackers-target-wordpress-plugin-vulnerability-after-poc-exploit-was-released\/\">vuln\u00e9rabilit\u00e9 XSS<\/a><\/strong> est qu&rsquo;elle peut compromettre enti\u00e8rement le syst\u00e8me de l&rsquo;appareil cibl\u00e9. Les attaques en question ont \u00e9t\u00e9 rep\u00e9r\u00e9es par une soci\u00e9t\u00e9 de s\u00e9curit\u00e9 WordPress connue sous le nom de Defiant.<\/p>\n\n\n\n<p>Le rapport de Defiant indique que la vuln\u00e9rabilit\u00e9 permet \u00e0 un acteur malveillant de g\u00e9n\u00e9rer de faux comptes d&rsquo;administrateur sur des sites web WordPress qui utilisent des versions de plugins non corrig\u00e9es, y compris 2,10.1, et toutes les versions mises \u00e0 jour.<\/p>\n\n\n\n<p>La faille de s\u00e9curit\u00e9 exploit\u00e9e dans le cadre de cette campagne malveillante a \u00e9t\u00e9 corrig\u00e9e en janvier apr\u00e8s la publication d&rsquo;une version actualis\u00e9e 2.10.2. Ram Gall, analyste des menaces, a d\u00e9clar\u00e9 que les archives de l&rsquo;entreprise montraient que la faille avait \u00e9t\u00e9 activement exploit\u00e9e depuis le 5 f\u00e9vrier 2023. Cependant, la derni\u00e8re attaque est la plus importante jamais enregistr\u00e9e contre cette faille.<\/p>\n\n\n\n<p>\u00ab\u00a0D&rsquo;apr\u00e8s nos archives, la vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 activement exploit\u00e9e depuis le 5 f\u00e9vrier 2023, mais il s&rsquo;agit de l&rsquo;attaque la plus importante que nous ayons jamais vue\u00a0\u00bb, <strong><a href=\"https:\/\/www.wordfence.com\/blog\/2023\/05\/wordfence-firewall-blocks-bizarre-large-scale-xss-campaign\/\">a d\u00e9clar\u00e9<\/a><\/strong> M. Gall. \u00ab\u00a0Nous avons bloqu\u00e9 pr\u00e8s de 3 millions d&rsquo;attaques contre plus de 1,5 million de sites \u00e0 partir de pr\u00e8s de 14 000 adresses IP depuis le 23 mai 2023, et les attaques se poursuivent.<\/p>\n\n\n\n<p>La campagne d&rsquo;attaque en cours est de grande envergure. Selon M. Gall, l&rsquo;acteur de la menace \u00e0 l&rsquo;origine de cette campagne s&rsquo;appuie sur un exploit mal configur\u00e9 qui ne d\u00e9ploie g\u00e9n\u00e9ralement pas de charge utile unique, m\u00eame lorsqu&rsquo;il cible un site WordPress utilisant une version de plugin vuln\u00e9rable aux exploits.<\/p>\n\n\n\n<p><strong>Les propri\u00e9taires et administrateurs de sites web sont invit\u00e9s \u00e0 faire la mise \u00e0 jour vers la derni\u00e8re version<\/strong><\/p>\n\n\n\n<p>Les propri\u00e9taires de sites web qui utilisent le plugin Beautiful Cookie Consent Banner ont \u00e9t\u00e9 invit\u00e9s \u00e0 le mettre \u00e0 jour. Les administrateurs ont d\u00e9clar\u00e9 qu&rsquo;en cas d&rsquo;attaque r\u00e9ussie, la configuration du plugin stock\u00e9e dans l&rsquo;option nsc_bar_bannersettings_json pourrait \u00eatre corrompue.<\/p>\n\n\n\n<p>Le d\u00e9veloppeur a d\u00e9j\u00e0 publi\u00e9 une mise \u00e0 jour pour r\u00e9soudre le probl\u00e8me. Les versions corrig\u00e9es du plugin ont \u00e9t\u00e9 mises \u00e0 jour de mani\u00e8re \u00e0 ce que le probl\u00e8me puisse \u00eatre r\u00e9solu au cas o\u00f9 un site web particulier aurait \u00e9t\u00e9 cibl\u00e9 par les exploits en cours.<\/p>\n\n\n\n<p>La vague d&rsquo;attaques actuellement observ\u00e9e sur les sites WordPress pourrait ne pas \u00eatre en mesure d&rsquo;installer une charge utile malveillante sur les sites web. L&rsquo;acteur de la menace \u00e0 l&rsquo;origine de cette campagne malveillante pourrait rem\u00e9dier au probl\u00e8me \u00e0 tout moment, et cela pourrait causer des dommages potentiels aux sites web qui sont encore expos\u00e9s.<\/p>\n\n\n\n<p>Les sites WordPress sont depuis longtemps vuln\u00e9rables aux attaques de piratage. La semaine derni\u00e8re, des acteurs de la menace ont commenc\u00e9 \u00e0 s&rsquo;int\u00e9resser \u00e0 certains <strong><a href=\"https:\/\/blog.koddos.net\/hackers-use-an-outdated-wordpress-plugin-to-backdoor-websites-in-an-ongoing-campaign\/\">sites WordPress<\/a><\/strong> qui utilisent les versions vuln\u00e9rables des plugins WordPress Advanced Custom Field et Essential Addons for Elementor, qui sont susceptibles d&rsquo;\u00eatre exploit\u00e9s.<\/p>\n\n\n\n<p>Dans le cas des versions du plugin Essential Addons for Elementor sur plusieurs sites web WordPress dans une vari\u00e9t\u00e9 de scans internet. Les hackers en question <strong><a href=\"https:\/\/www.wordfence.com\/blog\/2023\/05\/psa-attackers-actively-exploiting-critical-vulnerability-in-essential-addons-for-elementor\/\">exploitent<\/a><\/strong> une faille dans la r\u00e9initialisation du mot de passe du compte qui a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e plus t\u00f4t.<\/p>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 de gravit\u00e9 critique a \u00e9t\u00e9 rep\u00e9r\u00e9e sous le nom de CVE-2023-32243, et elle affecte les versions 5.4.0 \u00e0 5.7.1 d&rsquo;Essential Addons for Elementor, ce qui a permis \u00e0 des hackers de r\u00e9initialiser les mots de passe des comptes administrateurs et de prendre le contr\u00f4le des sites web.<\/p>\n\n\n\n<p>Les hackers ont aussi <strong><a href=\"https:\/\/www.akamai.com\/blog\/security-research\/attackers-leverage-sample-exploit-wordpress-plugin\">exploit\u00e9<\/a><\/strong> une faille corrig\u00e9e dans le plugin WordPress Advanced Custom Fields environ 24 heures apr\u00e8s qu&rsquo;un exploit de preuve de concept ait \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 publiquement. La vuln\u00e9rabilit\u00e9 est r\u00e9pertori\u00e9e sous le nom de CVE-2023-30777 et permet aux hackers de voler des informations sensibles afin d&rsquo;augmenter leurs privil\u00e8ges sur les sites WordPress concern\u00e9s.<\/p>\n\n\n\n<p>Cette vuln\u00e9rabilit\u00e9 a affect\u00e9 plus d&rsquo;un million de sites web et a \u00e9t\u00e9 d\u00e9tect\u00e9e au d\u00e9but de l&rsquo;ann\u00e9e. L&rsquo;\u00e9diteur a corrig\u00e9 la faille en publiant une mise \u00e0 jour de s\u00e9curit\u00e9. Les campagnes de piratage sur les deux sites WordPress ont commenc\u00e9 apr\u00e8s la publication d&rsquo;exploits de preuve de concept (PoC) permettant aux attaquants d&rsquo;obtenir un acc\u00e8s non autoris\u00e9 aux sites web apr\u00e8s avoir r\u00e9initialis\u00e9 les mots de passe administratifs et avoir un acc\u00e8s privil\u00e9gi\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des hackers ont lanc\u00e9 des attaques continues contre des sites WordPress. Ces attaques visent une vuln\u00e9rabilit\u00e9 XSS (cross-site scripting) stock\u00e9e et non authentifi\u00e9e dans un plugin WordPress de consentement aux cookies connu sous le nom de Beautiful Cookie Consent Banner (Banni\u00e8re de consentement aux cookies). Le plugin compte plus de 40 000 installations actives. Des &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5048,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-5047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Des hackers ont lanc\u00e9 des attaques continues contre des sites WordPress. Ces attaques visent une vuln\u00e9rabilit\u00e9 XSS (cross-site scripting) stock\u00e9e et non authentifi\u00e9e dans un plugin WordPress de consentement aux cookies connu sous le nom de Beautiful Cookie Consent Banner (Banni\u00e8re de consentement aux cookies). Le plugin compte plus de 40 000 installations actives. Des &hellip; Continue reading DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-27T02:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-28T17:16:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS\",\"datePublished\":\"2023-05-27T02:05:00+00:00\",\"dateModified\":\"2023-05-28T17:16:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/\"},\"wordCount\":1001,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/\",\"name\":\"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1\",\"datePublished\":\"2023-05-27T02:05:00+00:00\",\"dateModified\":\"2023-05-28T17:16:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/","og_locale":"fr_FR","og_type":"article","og_title":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS","og_description":"Des hackers ont lanc\u00e9 des attaques continues contre des sites WordPress. Ces attaques visent une vuln\u00e9rabilit\u00e9 XSS (cross-site scripting) stock\u00e9e et non authentifi\u00e9e dans un plugin WordPress de consentement aux cookies connu sous le nom de Beautiful Cookie Consent Banner (Banni\u00e8re de consentement aux cookies). Le plugin compte plus de 40 000 installations actives. Des &hellip; Continue reading DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS","og_url":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2023-05-27T02:05:00+00:00","article_modified_time":"2023-05-28T17:16:50+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp","type":"image\/webp"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS","datePublished":"2023-05-27T02:05:00+00:00","dateModified":"2023-05-28T17:16:50+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/"},"wordCount":1001,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/","url":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/","name":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1","datePublished":"2023-05-27T02:05:00+00:00","dateModified":"2023-05-28T17:16:50+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/des-hackers-exploitent-une-faille-xss-dans-un-plugin-de-consentement-aux-cookies-de-wordpress\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DES HACKERS EXPLOITENT UNE FAILLE XSS DANS UN PLUGIN DE CONSENTEMENT AUX COOKIES DE WORDPRESS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/05\/Hackers-exploit-XSS-flaw-in-a-WordPress-cookie-consent-plugin.webp?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-1jp","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=5047"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5047\/revisions"}],"predecessor-version":[{"id":5049,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/5047\/revisions\/5049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/5048"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=5047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=5047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=5047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}