WordPress quickly patches flaw after researcher goes public

WordPress has issued an update to fix a vulnerability that let hackers take over admin accounts

WordPress

WordPress has rushed out a patch for a critical security flaw that allowed hackers to take over sites running the CMS simply by leaving a malicous comment.

To use the cross-site scripting bug, hackers would leave a comment on a WordPress site with JavaScript, which is triggered simply when it's viewed. If it's viewed by a logged in administrator, the hacker could run code on the server or change the admin password, taking over the site.  

Finnish security researcher Jouko Pynnnen revealed the flaw on Monday, releasing it publicly without telling WordPress first, saying the CMS developer would take too long to fix it and people should be warned.

A blog post revealing the flaw said WordPress has "refused all communication attempts about our ongoing security vulnerability cases since November 2014".

Going public with the flaw appears to have worked: WordPress issued a patch within two days. WordPress 4.2.1 is a critical security release and will roll out as an automatic background update for sites with that feature enabled.   

"This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately," Wordpress said in a blog post. If you can't update to the new version immediately, Pynnnen advised turning off comments. 

WordPress acknowledged that Pynnnen uncovered the flaw, but didn't address his complaints that it isn't being responsive to security researchers.

A similar cross-site scripting bug was patched earlier this week by WordPress - more than a year after it was reported, according to a Kaspersky Lab's blog post

"During this time all WordPress servers using default comment settings have been quite easily hackable," that blog quoted Pynnnen as saying. "Now it turns out they still didn't get it right. It looks like the risk for WordPress users may be smaller and patches faster with full disclosure."

"Communication with WordPress developers has been difficult," Pynnnen added. "They simply seem to ignore all inquiries."

Security analyst Graham Cluley said it was "concerning" that Pynnnen was having such difficulty getting a response from WordPress. "With such a large part of the internet dependent on WordPress, it's essential that vulnerabilities are found quickly and squashed promptly," he added in a blog post

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021