Connecting to LinkedIn...



Critical WordPress XSS Flaw Left 86% of Sites at Risk

25/11/2014 by Sharon Shahzad


A whopping 86% of WordPress sites may have been vulnerable to a newly discovered, critical cross-site scripting (XSS) flaw which went unreported for over four years, according to security researchers.

Finnish firm Klikki Oy found the vulnerability in version 3.0 of the popular blogging software, which was released in 2010. Although version 4 is not affected by the flaw, most users – tens of millions in fact – are still on the older software platform.

“An attacker could exploit the vulnerability by entering carefully crafted comments, containing program code, on WordPress blog posts and pages. Under default settings comments can be entered by anyone without authentication (login).

Program code injected in comments would be inadvertently executed in the blog administrator's web browser when they view the comment. The rogue code could then perform administrative operations by covertly taking over the administrator account.”

Such “administrative operations” could include taking over the site by creating a new admin account and changing the current account password, then executing malicious PHP code on the server.

Although the flaw could be the worst for the blogging giant in five years, Klikki Oy said it had been working with the firm since 26 September and last week WordPress released official patches to deal with the issue.

These come in the form of automatic updates, so most users should be protected by default.

Cross-site scripting flaws are some of the most prevalent and dangerous around, according to security vendor High-Tech Bridge. The firm claimed that XSS accounted for the majority of the 169 flaws it has published in recent years.

"SQL injection vulnerabilities are becoming more and more rare, as well as other high and critical risk vulnerabilities. They are complex to detect and quite often require a lot of time to exploit,” argued HTB CEO Ilia Kolochenko.

“At the same time almost nobody cares about ‘medium-risk’ XSS vulnerabilities, leaving their websites vulnerable. Obviously, hackers benefit from such negligence and use XSS vulnerabilities to achieve their goals.”

This article has been extracted from, please click on this link to read the article in full

Montash is a multi-award winning, global IT recruitment business specialising in permanent and contract positions across mid-senior appointments, which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security and Assurance, Architecture & Strategy, Energy Technology, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles

comments powered by Disqus

Social Stream

Latest News


SAP announces partnership with STC

2016-10-25 10:00:00 +0100

One of the world’s leading providers of enterprise resource planning (ERP) solutions, SAP, has revealed that it is partnering with STC Advanced Solutions to offer both private and public sector organisations more empowerment. The two firms will be working alongside one another to provide cloud-based subscription services to firms of all sizes. This will help to deliver better information communication technology (ICT) across the Kingdom of Saudi Arabia....


Humans remain largest security flaw in cloud ...

2016-10-21 14:00:00 +0100

With a vast number of companies moving some, if not all, of their operations to the cloud, security continues to be of major concern. Whilst there are numerous patches and firewalls to safeguard defences, it has been highlighted that the most difficult area to protect against is human interaction. This is the view of Jamie Woodruff, a penetration tester and ethical hacker. Woodruff’s views come after he was contracted to conduct a penetration test in or...