WordPress quickly patches flaw after researcher goes public

WordPress

WordPress has rushed out a patch for a critical security flaw that allowed hackers to take over sites running the CMS simply by leaving a malicous comment.

To use the cross-site scripting bug, hackers would leave a comment on a WordPress site with JavaScript, which is triggered simply when it's viewed. If it's viewed by a logged in administrator, the hacker could run code on the server or change the admin password, taking over the site.

Finnish security researcher Jouko Pynnnen revealed the flaw on Monday, releasing it publicly without telling WordPress first, saying the CMS developer would take too long to fix it and people should be warned.

A blog post revealing the flaw said WordPress has "refused all communication attempts about our ongoing security vulnerability cases since November 2014".

Going public with the flaw appears to have worked: WordPress issued a patch within two days. WordPress 4.2.1 is a critical security release and will roll out as an automatic background update for sites with that feature enabled.

"This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately," Wordpress said in a blog post. If you can't update to the new version immediately, Pynnnen advised turning off comments.

WordPress acknowledged that Pynnnen uncovered the flaw, but didn't address his complaints that it isn't being responsive to security researchers.

A similar cross-site scripting bug was patched earlier this week by WordPress - more than a year after it was reported, according to a Kaspersky Lab's blog post.

"During this time all WordPress servers using default comment settings have been quite easily hackable," that blog quoted Pynnnen as saying. "Now it turns out they still didn't get it right. It looks like the risk for WordPress users may be smaller and patches faster with full disclosure."

"Communication with WordPress developers has been difficult," Pynnnen added. "They simply seem to ignore all inquiries."

Security analyst Graham Cluley said it was "concerning" that Pynnnen was having such difficulty getting a response from WordPress. "With such a large part of the internet dependent on WordPress, it's essential that vulnerabilities are found quickly and squashed promptly," he added in a blog post.