Monday , April 21 2025

Canadian cloud accounting unicorn leaks WordPress admin credentials

A popular accounting software provider with over 30 million users leaked their WordPress admins’ credentials, source code, and server backups, risking threat actors hijacking their website.

  • Founded in 2003, FreshBooks is a Canadian-based company providing invoicing, expenses, payments, and financial reporting services. The company claims to have more than 30 million users in 160+ countries.
  • The company left public access to their data, including user credentials for the WordPress site, the website’s source code, and server backups.
  • The data leak imposed various risks, including hijacking the website, making changes to its content, installing malicious software, or stealing sensitive information.
  • Cybernews reached out to FreshBooks and Canadian Centre for Cyber Security, and the access to data was secured.

The Cybernews research team discovered unsecured access to sensitive data belonging to Toronto-based cloud accounting software company – FreshBooks.

Hackers Exploit Zoom’s Remote Control Feature for System Access

ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom's remote control feature to access victims'...
Read More
Hackers Exploit Zoom’s Remote Control Feature for System Access

Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

𝐓𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐥𝐮𝐛 of University of Asia Pacific (UAP) is going to arrange ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’ 𝐂𝐚𝐩𝐭𝐮𝐫𝐞 𝐓𝐡𝐞...
Read More
Registration open for ‘𝐔𝐀𝐏 𝐂𝐘𝐁𝐄𝐑 𝐒𝐈𝐄𝐆𝐄 𝟐𝟎𝟐𝟓’

Samsung phone is saving your passwords in plain text

You copy a password from your manager, thinking it's safe. Meanwhile, your phone is saving it in plain text. Samsung...
Read More
Samsung phone is saving your passwords in plain text

UK Software Firm Exposed 8 million of Healthcare Worker Records

A data leak involving 8 million UK healthcare worker records, including IDs and financial information, was caused by a misconfigured...
Read More
UK Software Firm Exposed 8 million of Healthcare Worker Records

GitHub Enterprise Server Vulns Expose Risk of Code Execution

GitHub has released security updates for GitHub Enterprise Server to fix several vulnerabilities, including a high-severity flaw that could allow...
Read More
GitHub Enterprise Server Vulns Expose Risk of Code Execution

CVE-2025-2492
ASUS warns of critical auth bypass flaw in routers

Hackers can exploit a vulnerability in Asus routers to execute unauthorized functions. This serious issue, rated 9.2 out of 10,...
Read More
CVE-2025-2492  ASUS warns of critical auth bypass flaw in routers

16,000+ Fortinet devices compromised with symlink backdoor, Mostly in Asia

According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called "symlink". This number...
Read More
16,000+  Fortinet devices compromised with symlink backdoor, Mostly in Asia

Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

A critical security flaw has been found in the Erlang/Open Telecom Platform (OTP) SSH implementation, allowing an attacker to run...
Read More
Patch now! Critical Erlang/OTP SSH Vuln Allows UCE

CISA warns of increasing risk tied to Oracle legacy Cloud leak

On Wednesday, CISA alerted about increased breach risks due to the earlier compromise of legacy Oracle Cloud servers, emphasizing the...
Read More
CISA warns of increasing risk tied to Oracle legacy Cloud leak

CVE-2025-20236
Cisco Patches Unauthenticated RCE Flaw in Webex App

Cisco issued a security advisory about a serious vulnerability in its Webex App that allows unauthenticated remote code execution (RCE)...
Read More
CVE-2025-20236  Cisco Patches Unauthenticated RCE Flaw in Webex App

The firm exposed WordPress users managing the company’s website, its source code, and server backups. It posed a significant security threat, as malicious actors could have hijacked the company’s website.

The company develops web-based software for managing invoices, expenses, payments, and financial reports. In 2021, FreshBooks joined a herd of Canada’s unicorns by reaching a $1 billion valuation.

Cybernews contacted the company and Canadian Centre for Cyber Security, and the company fixed the issue. At the time of writing, the company has not responded to further Cybernews inquiries regarding the estimated time and cause of the data exposure.

Easily crackable passwords

On January 20, Cybernews researchers discovered a publicly accessible AWS Storage bucket belonging to FreshBooks. While it mainly stored images and metadata of FreshBooks’ blog, among the leaked data, were backups of the website’s source code and related database.

One of the databases contained information about the site, its configurations, and data of 121 WordPress users. Names, usernames, email addresses, and hashed passwords of the site’s administrators, writers, and editors were exposed.

The leaked passwords were hashed using the easily crackable WordPress MD5/phpass hashing framework leaving users’ accounts vulnerable to hijacking.

Risk of hijacking

Leaking users’ credentials and the website’s source code is a significant security concern. Using login credentials, attackers could potentially gain access to the website’s backend and make unauthorized changes to its content, install malicious software, move laterally to other machines connected to the website or steal sensitive information.

The website’s login page to the admin panel was secured and not publicly accessible. However, attackers could still bypass this security measure by connecting to the same network as the website or finding and exploiting a vulnerable WordPress plugin.

Considering that the source code of the website has also been leaked, attackers could potentially use it to gain a deeper understanding of installed plugins and locate any vulnerabilities that could be exploited.

In a server backup from 2019, Cybernews researchers identified at least five vulnerable plugins that were installed on the website at the time. These vulnerabilities include one critical, two high, and ten medium-severity issues.

Staying safe

Cybernews urges FreshBooks to consider the implications of the leaked data and respond promptly to address the data exposure. This includes changing all login credentials associated with the website, monitoring for suspicious activity, conducting a thorough security audit, implementing two-factor authentication (2FA), and notifying affected users about the leak.

Additionally, FreshBooks should have an incident response plan in place to manage the situation and mitigate any potential damage. Regular software updates are also crucial to ensure any security vulnerabilities are addressed promptly.

Check Also

ANY.RUN

Top 10 Malware Threats of the Week: Reports ANY.RUN

Cybersecurity platform ANY.RUN recently reported the top 10 malware threats of the week, highlighting a …

Leave a Reply

Your email address will not be published. Required fields are marked *