• We have discovered the Flexible Checkout Fields free vulnerability. Fortunately, the source of the security breach was quickly identified and we developed a 2.3.4 update fix.

    With the help of the WordPress community, we quickly identified the source of the problem and developed the appropriate vulnerability fix. The situation is now fully under control and Flexible Checkout Fields free plugin is no longer a threat. The 2.3.4 update we have just released prevents.

    Site infection symptoms:
    – the appearance of new admin accounts that weren’t created yourself
    – the appearance of new plugins on the plugins list that weren’t personally installed
    suspicious files, especially the ones with .php or .zip extensions e.g. Woo-Add-To-Carts.zip were placed in /wp-content/uploads/ directory
    – rearrangement of the checkout fields, their unusual faulty functioning or appearance of the new fields that hadn’t be previously added.
    – automatic redirections after moving to the checkout

    Even if you haven’t noticed any suspicious activity on your website it’s highly advised to take additional measures to eliminate the possible effects of the forementioned vulnerability and restore the appropriate level of security. Update the free version of Flexible Checkout Fields plugin at least to the 2.3.4 version or higher and follow the instructions in our article to make sure your shop hasn’t been infected: https://www.wpdesk.net/blog/flexible-checkout-fields-vulnerability/

    Please note that it’s really important to make all of the steps.

  • The topic ‘Flexible Checkout Fields – Problem with redirected to another site’ is closed to new replies.