WordPress plugin with 10,000+ installations being exploited in the wild

Found on Ars Technica on Thursday, 02 June 2016
Browse Software

A growing number of WordPress websites have been infected by attackers exploiting a vulnerability that remains unpatched in a widely used plugin called WP Mobile Detector, security researchers warned.

The vulnerability can be exploited only when PHP option allow_url_fopen is enabled.

Wordpress again. Apart from trying to stop this via php.ini, every operating system worth being used should have SELinux running, which, by default, blocks the webserver from making outbound network connections. If not, then setsebool -P httpd_can_network_connect off fixes that.