WordPress Core Files Security Vulnerability

Please note, none of our clients are vulnerable to the following security issue

Read more

In the past few days WordPress has bene suffering from a serious security breach. Securi, a specialist website security company identified a severe content injection (privilege escalation) vulnerability affecting the REST API. This vulnerability allows an unauthenticated user to modify the content of any post or page within a WordPress site.

Read more

A fix for this was silently included on version 4.7.2 along with other less severe issues. This was done intentionally to give everyone time to patch.

Read more

This privilege escalation vulnerability affects the WordPress REST API that was recently added and enabled by default on WordPress 4.7.0.

Read more

One of these REST endpoints allows access (via the API) to view, edit, delete and create posts. Within this particular endpoint, a subtle bug allows visitors to edit any post on the site.

Read more

The REST API is enabled by default on all sites using WordPress 4.7.0 or 4.7.1. If your website is on these versions of WordPress then it is currently vulnerable to this bug.

Read more

For most users, the website should update itself, but we advise anyone with a WordPress website to check to make sure their website is up to date.

Read more

As part of our hosting plans we have carried out the required updates for all our clients.

Read more

If you are concerned about security issues with your hosting and would like some help feel free to contact us here or on 01253 963016

Read more

Did you like this story?

Please share by clicking this button!

This page was generated by the plugin

Visit our site and see all other available articles!

Blackpool Web Design