HomeMalware & ThreatsWordPress plugin Jetpack addresses nearly decade-old critical security vulnerability

WordPress plugin Jetpack addresses nearly decade-old critical security vulnerability

Published on

spot_img

In a recent development, the widely-used WordPress plugin Jetpack has rolled out a critical security update to address a vulnerability that potentially put 27 million websites at risk. The flaw, discovered in the plugin’s contact form feature, had gone unpatched since 2016, leaving it open to exploitation by any logged-in user on a site to access forms submitted by other users, as per Jetpack engineer Jeremy Herve.

Despite no documented instances of the vulnerability being exploited in the wild, Herve cautioned that with the release of the update, there is a possibility that malicious actors may attempt to capitalize on it. He strongly advised users to promptly update to the latest version of the plugin, emphasizing that Jetpack has also issued fixes for all plugin versions dating back to 2016.

Jetpack, developed by Automattic, the entity behind WordPress, offers users an array of security, performance, and marketing tools to enhance their website operations. From real-time backups and automated malware scanning to spam protection and analytics, Jetpack aims to provide a comprehensive suite of services for website owners.

This isn’t the first instance of Jetpack addressing aged vulnerabilities within its service. Just last year, WordPress took swift action to rectify a critical flaw in a plugin version dating back to 2012, where threat actors could potentially manipulate any files within a WordPress installation.

The recent security updates from Jetpack come amidst revelations made by WordPress co-founder Matt Mullenweg, regarding the organization’s acquisition of a popular WP Engine plugin. The move was geared towards eliminating commercial upsells and rectifying a security concern within the plugin, amid tensions with WP Engine, a third-party WordPress hosting service and competitor to Automattic.

Mullenweg’s stance on WordPress’s authority to intervene in plugins without developer consent has raised eyebrows within the developer community, with some expressing apprehensions about potential conflicts with the platform’s open-source ethos, which has been a central tenet since its inception in 2003.

As the WordPress ecosystem navigates through these developments, it underscores the critical importance for platform stakeholders to remain vigilant and proactive in addressing security concerns. With the digital landscape evolving rapidly, maintaining a robust security posture is paramount to safeguarding the millions of websites reliant on WordPress and its associated plugins for their online presence.

Source link

Latest articles

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

More like this

The Battle Behind the Screens

 As the world watches the escalating military conflict between Israel and Iran, another...

Can we ever fully secure autonomous industrial systems?

 In the rapidly evolving world of industrial IoT (IIoT), the integration of AI-driven...

The Hidden AI Threat to Your Software Supply Chain

AI-powered coding assistants like GitHub’s Copilot, Cursor AI and ChatGPT have swiftly transitioned...