My Local Marketing Agency

Recent WordPress exploit. Get Up To Speed, Securing WordPress.

by | May 1, 2015 | Web Design

Home / Web Design / Recent WordPress exploit. Get Up To Speed, Securing WordPress.

Recent WordPress exploit. Update to the latest version, 4.2.1, NOW!

WordPress expertsIf your website is built on WordPress, I want you to know that there have been recent XSS (Cross-site Scripting) issues with WordPress versions 4.1.1 and earlier. This vulnerability can enable anonymous users to compromise a website if you do not Update your website to the newest WordPress versions and all themes and plugins. The issue was caused by documentation in the official WordPress Codex for the popular functions add_query_arg() and remove_query_arg() not being very clear, which has led to their unsecured use by developers.

This has affected many of the most popular WordPress themes and plugins. A comprehensive review is currently taking place to ensure that issues with the affected ones are being resolved.

According to Gary Pendergast, who is assisting in resolving this, “There is no official headcount on how many plugins are affected, as it’s a case-by-case thing to check.” He has also indicated that some of the affected plugins no longer have automated updates, stating, “Jetpack, EDD, P3, Download Monitor and Related Posts for WP opted-in for auto-updates; I didn’t keep track of who opted out.”

When was this issue discovered, and who was affected?

Yoast SEO pluginJoost De Valk first discovered the vulnerabilities in the themes and plugins and shared them on his Yoast site. He identified the issues with the themes and plugins approximately two weeks ago. A group of developers created a joint release with the WordPress security team. This joint release represented a shared mission to resolve these issues and share needed information with current users. All patches and updates were pushed to users within the last week.

As I said, not all affected themes and plugins have been determined. We have listed several identified below; however, this still needs to be completed.

 

  • Gravity Forms
  • WP E-Commerce
  • WP Touch
  • WordPress SEO
  • Updraft Plus
  • Google Analytics by Yoast
  • Jetpack
  • All-in-One SEO
  • Easy Digital Downloads
  • My Calendar
  • Ninja Forms

These represent a few of the affected themes and plugins, so if you do not see one you have used on the list, that does not mean it wasn’t a concern. As more research is completed, additional plugins will be identified.

Issues that cause vulnerability are not uncommon; they are more common than most people realize. What is important is that information is shared with the user and that the information needed to protect the user from vulnerabilities is shared.

What is being done to solve this issue?

The WordPress.org team has scrambled to investigate the issue and has released a critical security update, WordPress 4.2.1. This update has been rolled out as an automatic background update for websites enabling this function.

What if I am a developer and I have yet to be contacted?

Suppose you have been using the information provided in the WordPress Codex to develop functions that would correctly escape user input. In that case, you may have added incorrect coding, meaning you could also share the XSS vulnerability. The inaccurate information in the Codex was created in 2009, which means it is possible that you could have entered the wrong coding. First, please check whether you use the functions add_query_arg() and remove_query_arg() in your theme or plugin. If so, you will need to escape the output using one of the following functions:

  • If you are using the add_query_arg() or remove_query_arg() in an HTTP header or location redirect, you will need to use esc_url_raw() to escape the output
  • If you are using it as a link in printed materials, you will want to use the esc_url()

This information is laid out by Gary Prendergast’s post on the make.wordpress.org page, and it provides the steps needed to escape the output. By making these changes, you can resolve the vulnerabilities created by the original errors.

What if I am not a developer?

You should do that first if you haven’t updated your site to the latest WordPress version. This is critical because keeping your site up to date will help you maintain a secure site. When you purchase new themes and plugins, make sure that you check to see if there are any additional updates you need to load.

Also, look at who has access to your site. Ensure that the people with admin access are the only people you trust and who need it. Don’t overload your site with unnecessary themes and plugins; use only what you need. This will make managing the security of the themes and plugins you need easier. Make your passwords strong with this tool.

You should also regularly scan your site to see if any threats or issues arise, as regular scanning can prevent future problems. Could you make sure that you have a robust prevention system in place? While it may be costly on the front end, the savings from good prevention will pay off in the long run. New threats emerge daily, and prevention is the best defense; your site should be well protected. Think of your site as your business, then defend it. Take the steps to ensure that your site is protected by engaging the proper professional.

Maintenance Package with PX Media.

Logo Business Square PX Media offers WordPress maintenance packages that will put your mind at ease. We regularly check your site’s security, plugins, and theme versions and keep your WordPress current. We also keep a recent backup of your site, so if anything were to happen, you would be back up in minutes. As mentioned above, many things can go wrong if you update or add an incompatible plugin or theme to a WordPress CMS. We are always prepared.

Feel free to give us a call and get a free quote.

626.768.0760

www.PXMediaInc.com

Frequently Asked Questions

What are the most critical recent WordPress threats?
Recent vulnerabilities include the Post SMTP plugin flaw (CVE-2025-24000) allowing site takeover via email log access, and a dangerous exploit in the Gravity Forms plugin via compromised installer files.
How did attackers exploit the Post SMTP vulnerability?
A broken access control in the plugin’s REST API let low-level users access sensitive data, including admin password reset emails, enabling them to hijack websites.
What happened with the Gravity Forms plugin?
During a supply chain attack, the installer file was compromised with malware that enabled remote code execution and unauthorized admin account creation. The vulnerability existed only in manual downloads auto-updates were unaffected.
Why are WordPress plugins and themes frequent targets?
Because they often lack regular maintenance or quality control, they’re easier entry points for attackers aiming to exploit outdated or vulnerable components.
What proactive steps should site owners take to stay secure?
Always use trusted themes and plugins, keep everything updated, limit admin access to trusted users, scan for malware regularly, and use security tools like WPScan or Jetpack Protect.
Why are virtual firewall patches (vPatches) helpful?
They offer immediate protection against known exploits even before official patches are released by blocking attack vectors at the firewall level.
How widespread are WordPress vulnerabilities?
In the latest reports, hundreds of new vulnerabilities in plugins and themes get disclosed weekly. Many remain unpatched for some time, leaving sites exposed.
Why is excessive use of themes/plugins risky?
Unnecessary components increase your attack surface. Only install plugins and themes you currently use and update or remove the rest promptly.
Why is frequent scanning important?
Regular scans help detect issues early since security threats evolve rapidly, being proactive is key to prevention.
What does PX Media recommend for WordPress security?
Keep core, theme, and plugin updates current, restrict admin privileges, use only trusted extensions, implement routine scans, and consider a managed maintenance plan with reliable backups.

Douglas Goddard* (135)

Douglas is the visionary behind “PX Media,” a beacon of creativity and excellence in marketing for over two decades. Within his illustrious career, Douglas has not only mastered the art of web design, online marketing, and photography. Still, he has also become a pivotal figure in transforming visions into digital realities. His educational journey through renowned institutions, where he delved into fine art and design, laid the foundation for his exceptional skill set. Beyond his technical prowess, Douglas is celebrated for his unwavering honesty, trustworthiness, and educational approach that empowers clients and peers alike.

Secret Link