WordPress Core Files Security Vulnerability

 In Security

Please note, none of our clients are vulnerable to the following security issue

In the past few days WordPress has bene suffering from a serious security breach. Securi, a specialist website security company identified a severe content injection (privilege escalation) vulnerability affecting the REST API. This vulnerability allows an unauthenticated user to modify the content of any post or page within a WordPress site.

A fix for this was silently included on version 4.7.2 along with other less severe issues. This was done intentionally to give everyone time to patch.

This privilege escalation vulnerability affects the WordPress REST API that was recently added and enabled by default on WordPress 4.7.0.

One of these REST endpoints allows access (via the API) to view, edit, delete and create posts. Within this particular endpoint, a subtle bug allows visitors to edit any post on the site.

The REST API is enabled by default on all sites using WordPress 4.7.0 or 4.7.1. If your website is on these versions of WordPress then it is currently vulnerable to this bug.

For most users, the website should update itself, but we advise anyone with a WordPress website to check to make sure their website is up to date.

As part of our hosting plans we have carried out the required updates for all our clients.

If you are concerned about security issues with your hosting and would like some help feel free to contact us here or on 01253 963016

Recommended Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Start typing and press Enter to search