Skip to content

May 7, 2015

WordPress vulnerability leaves millions of sites open to attack

by John_A

<img alt="Wordpress Schwag" data-caption="Ayer me llegó un paquete de WordPress, y justo que con Noel estabamos pelandolo el dia anterior acerca de ciertas clases de CSS bizarra que incluye, por eso voy a regalar todo lo que mandaron a los que posteen aca.
Bah, posta si quieren stickers posteen, el regalo mas freak es un tatuaje temporal con el logo de WordPress, me pondré uno en el verano.” data-credit=”Peregrino Will Reign/Flickr” data-credit-link-back=”https://www.flickr.com/photos/71813425@N00/2913018697″ src=”http://o.aolcdn.com/dims-shared/dims3/GLOB/crop/2816×1859+0+116/resize/630×416!/format/jpg/quality/85/http://hss-prod.hss.aol.com/hss/storage/midas/b2a6a79421e8b4fdd4f0e15abf9fd194/201962059/2913018697_ccbb33e993.jpg” data-mep=”808821″ />

If you’ve got a WordPress site, pay attention: A recently discovered vulnerability within the blogging platform leaves your site open to attack, according to the security firm Sucuri. So far, it affects the TwentyFifteen theme (installed by default) and the JetPack plugin, which has over a million installations. At issue is the the “genericons” WordPress package, something that both of those WordPress add-ons use, which comes with an insecure file that leaves sites open to a cross-site scripting vulnerability. If a hacker can trick you into clicking a malicious link, they can get full control of your WordPress site. Thankfully, the fix is pretty simple: Just remove the “example.html” file from any instance of genericons in your WordPress installation. Sucuri has also warned several hosting providers about the vulnerability, including Godaddy, Dreamhost and WPEngine who’ve already patched against the issue.

[Photo credit: Armando Torrealba/Flickr]

Comments

Via: Ars Technica

Source: Sucuri

Read more from News

Leave a comment

Note: HTML is allowed. Your email address will never be published.

Subscribe to comments