OVRI Payment Vulnerability (Medium) – CVE-2024-10938

OVRI Payment Vulnerability (Medium) – CVE-2024-10938

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2024-10938 (Medium severity, CVSS 6.5) affects the OVRI Payment WordPress plugin (slug: moneytigo) version 1.7.0. The issue involves malicious .htaccess directives shipped inside the plugin, which can influence what code is allowed to run on your web server.

The primary risk scenario is straightforward from a business perspective: if the malicious .htaccess files are moved or copied outside the plugin directory (intentionally or accidentally during troubleshooting, migrations, backups/restores, “security hardening,” or file cleanup), they may begin affecting broader areas of the site.

Because this is a server configuration behavior, the impact is not limited to a single page or workflow. It can surface during routine operations such as plugin updates, hosting changes, or incident response actions where files are reorganized or restored from backups.

Security Weakness

The weakness is that OVRI Payment 1.7.0 includes malicious .htaccess files containing directives that block execution of certain scripts while allowing execution of known malicious PHP files. In plain terms, the configuration is designed to tilt the environment toward allowing bad code to run while restricting other activity.

This is especially concerning for leadership because it shifts the risk from a typical “bug” to a trust and integrity problem in the software supply chain: the plugin version itself contains configuration designed to change server behavior in a harmful way.

There is currently no known patch available. That means risk reduction depends on operational decisions (e.g., removal, replacement, stronger monitoring) rather than waiting for an update.

Technical or Business Impacts

If the malicious .htaccess directives are placed where they can influence broader site paths, they can interfere with normal site operation and create conditions where malicious PHP files are more likely to execute. This can translate into practical business impacts such as site instability, unexpected errors, reduced conversion rates, and degraded customer trust.

For marketing and revenue teams, even short disruptions can affect campaign landing pages, payment/checkout flows, and lead capture. For executives and finance, the risk expands to incident response costs, operational downtime, and potential compliance exposure if site integrity is questioned or if malicious activity is suspected.

Recommended action based on the disclosed remediation guidance: since there is no known patch, consider uninstalling OVRI Payment (moneytigo) 1.7.0 and replacing it with an alternative that meets your requirements. At minimum, ensure your team reviews plugin files for unexpected .htaccess behavior and avoids moving these files outside the plugin directory during maintenance. For details and ongoing tracking, see the official CVE record: https://www.cve.org/CVERecord?id=CVE-2024-10938 and the source advisory: Wordfence vulnerability entry.

Similar Attacks

This issue aligns with a broader pattern where attackers abuse “trusted” components (themes/plugins) to introduce backdoors or configuration changes that help malicious code run. Examples of similar real-world incidents include:

Supply-chain attacks on web CMS extensions distributing backdoors (BleepingComputer)

WordPress plugin exploitation leading to widespread compromise (Wordfence: RevSlider exploitation history)

WordPress supply-chain attack patterns and impact (Sucuri)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers