<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exactmetrics — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/exactmetrics/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/exactmetrics/feed.xml" rel="self" type="application/rss+xml"/><item><title>ExactMetrics WordPress Plugin Vulnerability Leads to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-exactmetrics-rce/</guid><description>The ExactMetrics plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation via a REST API endpoint, potentially leading to remote code execution by authenticated attackers.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-5464, exists in the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin, affecting all versions up to and including 9.1.2. The vulnerability allows authenticated attackers with Editor-level access or higher, who also possess the &rsquo;exactmetrics_view_dashboard&rsquo; capability, to install and activate arbitrary WordPress plugins from attacker-controlled URLs. This is possible due to the exposure of the &lsquo;onboarding_key&rsquo; transient and the lack of proper authorization checks on the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Successful exploitation can lead to Remote Code Execution (RCE) on the target WordPress site. This poses a significant risk to websites using the vulnerable plugin, as attackers can inject malicious code and gain full control of the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site as an Editor or Administrator.</li>
<li>The attacker obtains the &lsquo;onboarding_key&rsquo; by accessing the reports page, which exposes the transient value to users with the &rsquo;exactmetrics_view_dashboard&rsquo; capability.</li>
<li>The attacker uses the &lsquo;onboarding_key&rsquo; to access the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint, receiving a one-time hash (OTH) token.</li>
<li>The attacker crafts a malicious plugin ZIP file hosted on an attacker-controlled server.</li>
<li>The attacker sends a request to the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint, providing the OTH token and the URL of the malicious plugin ZIP file via the &lsquo;file&rsquo; parameter. This endpoint lacks capability checks and nonce verification.</li>
<li>The ExactMetrics plugin downloads the malicious plugin ZIP file from the attacker-controlled URL.</li>
<li>The ExactMetrics plugin installs and activates the malicious plugin.</li>
<li>The attacker gains Remote Code Execution on the WordPress server through the installed malicious plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5464 allows attackers to install arbitrary plugins on vulnerable WordPress sites, leading to Remote Code Execution. This grants the attacker complete control over the compromised website, enabling them to inject malicious code, deface the site, steal sensitive data, or use the site for further malicious activities. The number of affected websites depends on the widespread use of the ExactMetrics plugin. Organizations using this plugin are at risk of significant data breaches and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin to the latest version, which patches CVE-2026-5464.</li>
<li>Monitor web server logs for suspicious requests to the &lsquo;/wp-json/exactmetrics/v1/onboarding/connect-url&rsquo; REST endpoint and the &rsquo;exactmetrics_connect_process&rsquo; AJAX endpoint. Implement the Sigma rule provided below to detect exploitation attempts.</li>
<li>Implement strong password policies and multi-factor authentication to prevent unauthorized access to WordPress accounts.</li>
<li>Restrict the &rsquo;exactmetrics_view_dashboard&rsquo; capability to only the necessary users.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>rce</category><category>cve-2026-5464</category><category>exactmetrics</category></item></channel></rss>