WordPress quickly patches flaw after researcher goes public

WordPress has issued an update to fix a vulnerability that let hackers take over admin accounts

WordPress

WordPress has rushed out a patch for a critical security flaw that allowed hackers to take over sites running the CMS simply by leaving a malicous comment.

To use the cross-site scripting bug, hackers would leave a comment on a WordPress site with JavaScript, which is triggered simply when it's viewed. If it's viewed by a logged in administrator, the hacker could run code on the server or change the admin password, taking over the site.  

Finnish security researcher Jouko Pynnnen revealed the flaw on Monday, releasing it publicly without telling WordPress first, saying the CMS developer would take too long to fix it and people should be warned.

A blog post revealing the flaw said WordPress has "refused all communication attempts about our ongoing security vulnerability cases since November 2014".

Going public with the flaw appears to have worked: WordPress issued a patch within two days. WordPress 4.2.1 is a critical security release and will roll out as an automatic background update for sites with that feature enabled.   

"This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately," Wordpress said in a blog post. If you can't update to the new version immediately, Pynnnen advised turning off comments. 

WordPress acknowledged that Pynnnen uncovered the flaw, but didn't address his complaints that it isn't being responsive to security researchers.

A similar cross-site scripting bug was patched earlier this week by WordPress - more than a year after it was reported, according to a Kaspersky Lab's blog post

"During this time all WordPress servers using default comment settings have been quite easily hackable," that blog quoted Pynnnen as saying. "Now it turns out they still didn't get it right. It looks like the risk for WordPress users may be smaller and patches faster with full disclosure."

"Communication with WordPress developers has been difficult," Pynnnen added. "They simply seem to ignore all inquiries."

Security analyst Graham Cluley said it was "concerning" that Pynnnen was having such difficulty getting a response from WordPress. "With such a large part of the internet dependent on WordPress, it's essential that vulnerabilities are found quickly and squashed promptly," he added in a blog post

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
IT Pro Panel: Why IT leaders need soft skills
professional development

IT Pro Panel: Why IT leaders need soft skills

26 Jul 2021