A short search via this internet site will find masses of information signals approximately security vulnerabilities in WordPress and its forty,000+ 0.33-birthday celebration plugins.
But I also remember that if you use WordPress, you do need to take safety significantly.
On Sunday, Finnish security researcher Jouko Pynnönen of Klikki Oy went public with a zero-day critical pass-site scripting (XSS) vulnerability in WordPress 4.2 and in advance.
A hacker could inject code into the shape of the comment discovered on thousands and thousands of blogs international, which – while viewed through the website’s administrators – ought to allow them to trade passwords, upload new passwords, or take other movements that would typically require website admin rights.
Here is a video (to alternatively extra classy music than the every day 0-day take advantage of video gets) displaying an attack in motion
If brought about with the aid of a logged-in administrator, beneath default settings, the attacker can leverage the vulnerability to execute arbitrary code at the server via the plugin and subject matter editors.
Alternatively, the attacker should exchange the administrator’s password, create new administrator accounts, or do something the currently logged-in administrator can do on the target machine. If the textual comment content is long enough, it will be truncated while inserted within the database. The MySQL textual content kind length restriction is sixty-four kilobytes, so the comment has to be pretty long. The truncation effects in malformed HTML generated on the page. The attacker can supply any attributes in the allowed HTML tags inside the identical way as with the two these days posted saved XSS vulnerabilities affecting the WordPress core. Some managed WordPress hosts, inclusive of WPEngine and dxw did their customers proud via taking proactive steps to defend them earlier than the legitimate patch became launched. However, safety researcher Jouko Pynnönen seems to stay pissed off at the tardiness of WordPress to reply to vulnerabilities he has uncovered