message

Jetpack Critical Security Vulnerability

Security

WordPress

Jetpack Critical Security Vulnerability


May 27, 2016
Hristo Pandjarov

jetpack

Today a critical vulnerability was found in one of the most popular and widely used WordPress plugins – Jetpack. Fortunately, according to the plugin authors there is no evidence that this issue has been used to hack real sites. However, an update of the plugin was released – Jetpack 4.0.3.

As usual, our security team was pro-active and updated our WAF (web application firewall), adding rules to prevent the hack from being used. This means that even if your plugin is not updated to the latest version, your site will still be protected. However, we urge all Jetpack users to update the plugin to its latest version in which the vulnerability is patched.

var blog_subscribing_started = false;
var blog_subscribing_rendered = false;
var formSubmitBtn = $(‘form.subscribe-form’).find(‘.btn-submit’);
$(document).ready(function(ev) {
formSubmitBtn.on(‘click’, function(ev) {
ev.preventDefault();
let form = $(this).closest(‘.subscribe-form’);
if (blog_subscribing_started || $(this).hasClass(‘btn-disabled’)) {
return;
}

blog_subscribing_started = true;
blog_subscription_hide_errors(form);

grecaptcha.ready(function() {
grecaptcha.execute(r3k, {action: ‘submit’}).then(function(token) {
document.querySelectorAll(‘#rt3’).forEach(function(e) { e.value = token; })
blog_subscription_send_form(form);
});
});

});

})

function renderRecaptcha2(form) {
if (!$(‘#recaptcha2_challenge’).length) {
let verifyCallback = function(response) {
document.querySelectorAll(‘#rt2’).forEach(function(e) { e.value = token; })
};
$(‘

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button