Jetpack Critical Security Vulnerability
Security
•
WordPress
•
Jetpack Critical Security Vulnerability
Today a critical vulnerability was found in one of the most popular and widely used WordPress plugins – Jetpack. Fortunately, according to the plugin authors there is no evidence that this issue has been used to hack real sites. However, an update of the plugin was released – Jetpack 4.0.3.
As usual, our security team was pro-active and updated our WAF (web application firewall), adding rules to prevent the hack from being used. This means that even if your plugin is not updated to the latest version, your site will still be protected. However, we urge all Jetpack users to update the plugin to its latest version in which the vulnerability is patched.
Thanks!
Please check your email to confirm your subscription.


Sign Up For More Awesome Content!
Sign up for our newsletters with the latest content and offer updates. You can unsubscribe at any time.
Google reCAPTCHA used. Privacy Policy and Terms of Service apply
var blog_subscribing_started = false;
var blog_subscribing_rendered = false;
var formSubmitBtn = $(‘form.subscribe-form’).find(‘.btn-submit’);
$(document).ready(function(ev) {
formSubmitBtn.on(‘click’, function(ev) {
ev.preventDefault();
let form = $(this).closest(‘.subscribe-form’);
if (blog_subscribing_started || $(this).hasClass(‘btn-disabled’)) {
return;
}
blog_subscribing_started = true;
blog_subscription_hide_errors(form);
grecaptcha.ready(function() {
grecaptcha.execute(r3k, {action: ‘submit’}).then(function(token) {
document.querySelectorAll(‘#rt3’).forEach(function(e) { e.value = token; })
blog_subscription_send_form(form);
});
});
});
})
function renderRecaptcha2(form) {
if (!$(‘#recaptcha2_challenge’).length) {
let verifyCallback = function(response) {
document.querySelectorAll(‘#rt2’).forEach(function(e) { e.value = token; })
};
$(‘