• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

WordPress Rushes Out Jetpack Patch to Millions

You are here: Home / Cyber Security News / WordPress Rushes Out Jetpack Patch to Millions

The computer software company at the rear of well known running a blog platform WordPress is immediately updating in excess of five million installations of its Jetpack plugin after a critical vulnerability was found in it.

Automattic, which also counts Jetpack as 1 of its subsidiaries, commenced the update yesterday to convey consumers up to day with the new model, 12.1.1.

“During an internal security audit, we discovered a vulnerability with the API offered in Jetpack due to the fact model 2., unveiled in 2012,” defined developer relations engineer at Automattic, Jeremy Herve. “This vulnerability could be used by authors on a web site to manipulate any information in the WordPress set up.”

Herve, claimed there is no proof the vulnerability has been exploited in the wild.

“However, now that the update has been released, it is attainable that a person will check out to just take gain of this vulnerability,” he cautioned.

“To assist you in this procedure, we have worked intently with the WordPress.org Security Crew to release patched variations of each and every variation of Jetpack considering that 2.. Most web sites have been or will soon be quickly current to a secured edition.”

Herve detailed 102 new variations of Jetpack released yesterday to remediate the bug.

Go through far more on WordPress threats: High Severity WordPress Plugin Bug Hits A few Million

Jetpack is created to provide buyers a selection of security attributes, together with automated backups and a single-click restores, a web software firewall, malware scans and brute-drive attack security. These occur together with abilities for optimizing and customizing web sites and getting visibility into general performance.

These abilities acquired Jetpack thousands and thousands of world downloads.

Despite the fact that reasonably unusual, computerized updates have been issued by Automattic in the past to repair security issues.

In June 2022, for case in point, it force-set up an update to the popular Ninja Types plugin following around a million websites ended up found exposed to a new vulnerability becoming actively exploited in the wild.

WordPress and its plugins continue being a key concentrate on for threat actors.

Security firm Wordfence claimed in 2020 that attackers have been using automated equipment to research for sites continue to jogging an out-of-date model of the File Manager plugin containing a zero-working day bug.

Editorial picture credit: Postmodern Studio / Shutterstock.com

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
Next Post: Pentagon Cyber Policy Cites Learnings from Ukraine War »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
  • Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
  • Securing Agentic AI: How to Protect the Invisible Identity Access
  • AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Copyright © 2025 · AllTech.News, All Rights Reserved.