A significant vulnerability has been identified in the Malcure Malware Scanner plugin, a popular security tool used on over 10,000 WordPress sites. This security weakness poses serious risks to website owners and demands immediate attention.
Overview of the Malcure Plugin Vulnerability
Security researchers from Wordfence have uncovered a high-severity flaw in the Malcure Malware Scanner plugin currently available on the WordPress repository. Classified with a severity rating of 8.1 out of 10, this issue allows attackers with even the lowest levels of access to delete important files from affected websites. The flaw stems from a missing capability check within the plugin’s wpmr_delete_file() function.
Why This Vulnerability Matters
While the vulnerability requires attacker authentication, the minimum level needed is merely that of a subscriber—the default role assigned to anyone who signs up on a WordPress site when registration is enabled. This makes it easier for bad actors to exploit the flaw compared to vulnerabilities that require higher access levels such as editors or administrators.
Once an attacker gains subscriber access, they can execute arbitrary file deletions when the plugin’s advanced mode is turned on, potentially escalating this to remote code execution. In simpler terms, attackers could remove critical files and possibly take control of the website, leading to severe consequences including data loss and compromised security.
Current Status and Recommendations
At present, Malcure does not have a patch to fix this vulnerability. Recognizing the threat, the WordPress plugin directory has temporarily removed the Malcure Malware Scanner plugin from its listings for safety reasons. The plugin page now carries a message indicating that the tool is undergoing review.
Wordfence advises users to disable and uninstall the Malcure plugin immediately to reduce the chance of exploitation. Until a secure update is released, relying on this plugin could put websites at unnecessary risk.
What Site Owners Should Do Now
- Deactivate and uninstall Malcure: Remove the plugin from your WordPress installation to neutralize the vulnerability.
- Restrict user roles: If possible, limit subscriber-level registrations or monitor for suspicious activity among new users.
- Stay updated: Keep an eye on official WordPress channels for updates or patches that fix this issue.
- Use alternative tools: Consider other trusted malware scanners with strong security records until Malcure’s vulnerability is resolved.
The Importance of Vigilance in WordPress Security
WordPress powers a substantial portion of the web, making it a prime target for attacks. Security plugins are vital for protecting sites but can themselves become vulnerabilities if not regularly maintained. This recent case with Malcure highlights the importance of monitoring plugin health and promptly addressing security advisories.
Summary
The highly-rated Malcure Malware Scanner plugin contains a critical vulnerability that allows low-level authenticated users to delete files, with a risk of remote code execution. With no fix currently available, WordPress has suspended the plugin from its marketplace. Website owners are strongly encouraged to uninstall Malcure and seek alternative malware protection until a secure version is released.
Frequently Asked Questions (FAQs)
Q: What exactly is the Malcure Malware Scanner vulnerability?
A: It’s a security flaw in the plugin’s file deletion function (wpmr_delete_file()) that lets attackers with even subscriber-level access delete arbitrary files when advanced mode is enabled. This could lead to remote code execution on affected websites.
Q: How serious is this vulnerability?
A: Rated 8.1 out of 10 for severity, it is considered high risk since it can be exploited by users with minimal permissions, potentially allowing attackers to compromise a site entirely.
Q: What should users of the Malcure plugin do right now?
A: Users should immediately deactivate and uninstall the plugin to avoid exploitation. They should also monitor their sites for suspicious activity and wait for the developer to release an updated, secure version.
Q: Has a patch been issued to fix this problem?
A: No patch is currently available. The plugin has been temporarily removed from the official WordPress repository for review.
Q: Can this vulnerability affect all WordPress sites?
A: Only sites that have the Malcure Malware Scanner plugin installed and advanced mode enabled are vulnerable. Other sites without this plugin or using different scanners are not affected.
Protecting your WordPress site starts with staying alert to security issues in plugins you rely on. The Malcure Malware Scanner vulnerability is a clear reminder to practice caution, keep software updated, and choose trusted tools for website safety.

Leave a Comment