HelloARI logo: vinyl signs and identity design web design«    sign design«    blog«    contact«  USE MY IMAGINATION
web design and wordpress development 94114

san frnacisco web design

Fake WordPress Email about CVE-2024-46188 Patch

Many WordPress users recently received a fake email claiming to be from the WordPress Security Team about a supposed vulnerability called “Remote Code Execution (RCE)” on their website. The users are asked to download, install and activate a CVE-2024-46188 Patch plugin.

Here is what the email looks like:

This is not a solicited email and you should not click on the download button, which will actually take you to a site that has cloned the WordPress.org site in a very sophisticated way. If you get tricked into installing the plugin, it will create a hidden user account with administrator privileges which will be sent to the attackers.

Here are a couple of things to be aware of so you can recognize phishing emails:

  1. The WordPress Security Team will never email you requesting that you install a plugin or theme on your site, and will never ask for an administrator username and password.
  2. Official emails from the WordPress project will always come from a @wordpress.org or @wordpress.net domain. You can notice that the above email comes from a “mailing-wordpress.org” domain. Tricky!
  3. Phishing emails insist that you act immediately or there might be crucial consequences. Always make sure you check if the information is legitimate before taking any action.

You can find more about WordPress Security Team impersonation scams here.

This entry was posted in WordPress. Bookmark the permalink. Post a comment or leave a trackback: Trackback URL.

Post a Comment

Your email is never published nor shared. Required fields are marked *

You may use these HTML tags and attributes <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

*
*

© 1996 - 2025
contact  |  links  |  rss