• Design
  • SEO
  • Portfolio
  • Why Choose Us
  • Blog
  • Contact
  • Facebook
  • Google+
Precise Online ManagementPrecise Online Management
  • Design
  • SEO
  • Portfolio
  • Why Choose Us
  • Blog
  • Contact
  • Facebook
  • Google+

PHP vulnerability could lead to WordPress websites being comprised

WordPress

PHP vulnerability could lead to WordPress websites being comprised

August 22, 2018 News, Security

News Courtesy of theregister.co.uk:

A newly discovered WordPress flaw has left installs of the ubiquitous content management system potentially vulnerable to hacking.

Security shortcomings let attackers exploit weaknesses within WordPress’s PHP framework, allowing already registered users without admin privileges to run exploit code, infosec consultancy Secarma has warned.

The hole offers a previously undiscovered way to expose “unserialization” in the platform’s code using a combination of XML external entity (XXE) attacks and server-side request forgery (SSRF).

– Read Source Article

Ryan’s Take

The majority of WordPress website administrators shouldn’t be freaking out. Basically, your security has to be pretty lax in order for the sequence of events to take place for a complete system takeover. Any good admin knows to install a firewall application for WordPress. There are several plugins available that are fairly easy to set up. I suggest All in One WP Security & Firewall if you’re looking for a robust solution.

The article does point out that the WordPress team has been aware of the issue since February 2017. I find that very surprising. They’re usually pretty quick to patch any vulnerabilities. Is it a sign that they don’t take this particular problem very seriously? Or would it require a drastic overhaul of code to fix the bug? Maybe it will get some priority now that it is out in the public.

For those of you who are interested in a detailed explanation. A video demonstration of the exploit can be seen here. It’s a rather lengthy video clocking in at almost 48 minutes. I’ve linked to the part directly referencing WordPress. Watching the explanation and steps necessary to perform the exploit certainly has me confused. It’s not idiot-proof and appears to require some extensive knowledge of PHP functionality. Still, I think the author of the exploit was wise to release it. This should force some kind of response from either the PHP team or WordPress.

0 0 votes
Article Rating
Share
0

About Ryan Faucher

Owner-operator of Precise Online Management. I also manage Kettlebell Krusher, a website dedicated to all things kettlebell as well a blog for my weight loss progress.

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Categories

  • News
  • Niche Dreams
  • Reviews
  • Security
  • SEO
  • Tips

Recent Posts

  • 9 Benefits of Social Media for Your Organization
  • Advantages of Having Marketing Research Samples
  • Link Building Services: How To Find A Trustworthy Provider
  • SAS Affiliate Review and Tips for Affiliate Marketers
  • Comparison Of The Best Link Indexing Service Features & Benefits

Archives

  • January 2022
  • January 2021
  • October 2020
  • September 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
Ready to get started? Pick and choose your website and / or SEO services Order Services

© 2025 · Precise Online Management, LLC.
This site is owned and operated by Ryan Faucher

  • Visit Us on Facebook
  • Visit Us On Google+
Prev Next
wpDiscuz
X
WEB DESIGN SPECIAL PRICING - Over 60% off design packages through Fiverr
See Details