WordPress: Automatic update to fix vulnerability in Jetpack plugin

Home/Compromised, Internet Security, Security Advisory, Security Update, Tips, vulnerability, wordpress/WordPress: Automatic update to fix vulnerability in Jetpack plugin

WordPress: Automatic update to fix vulnerability in Jetpack plugin

The popular and one of the most-used WordPress plugins, Jetpack recently addressed a critical security issue. Despite no active exploitation, WordPress force installed Jetpack plugin updates to websites to patch the vulnerability.

Vulnerability in plugin

Reportedly, the Jetpack plugin had developed a severe security flaw that risked millions of WordPress websites. The news surfaced online as the Jetpack team rolled out a major security update for the plugin, urging users to update.

What is Jetpack plugin?

Jetpack is a powerful WordPress plugin that offers a range of features such as site stats, security services, social media integration, and more. It is designed to enhance the performance, security, and overall functionality of WordPress websites. With over a million active installations, Jetpack has become an integral part of many WordPress-powered sites.

The critical flaw discovered in the Jetpack 2.0 plugin posed a significant security risk to millions of websites. Hackers could exploit this vulnerability to gain unauthorized access to the affected sites, potentially compromising sensitive user data and wreaking havoc on the site’s functionality. Upon discovering this flaw, the WordPress development team acted swiftly to release Jetpack 12.1.1 an urgent update that addresses the issue and eliminates the vulnerability.

“Please update your Jetpack version as soon as possible to take care of it better safety of your website. To help you in this process, we’ve worked closely with the WordPress.org Security Team to release patched versions of every version of Jetpack since version 2.0. Most sites have been or will soon be automatically updated to a secure version”.

If your site is running any of these versions, your website is not vulnerable.

2.0.9, 2.1.7, 2.2.10, 2.3.10, 2.4.7, 2.5.5, 2.6.6, 2.7.5, 2.8.5, 2.9.6, 3.0.6, 3.1.5, 3.2.5, 3.3.6, 3.4.6, 3.5.6, 3.6.4, 3.7.5, 3.8.5, 3.9.9, 4.0.6, 4.1.3, 4.2.4, 4.3.4, 4.4.4, 4.5.2, 4.6.2, 4.7.3, 4.8.4, 4.9.2, 5.0.2, 5.1.3, 5.2.4, 5.3.3, 5.4.3, 5.5.4, 5.6.4, 5.7.4, 5.8.3, 5.9.3, 6.0.3, 6.1.4, 6.2.4, 6.3.6, 6.4.5, 6.5.3, 6.6.4, 6.7.3, 6.8.4, 6.9.3, 7.0.4, 7.1.4, 7.2.4, 7.3.4, 7.4.4, 7.5.6, 7.6.3, 7.7.5, 7.8.3, 7.9.3, 8.0.2, 8.1.3, 8.2.5, 8.3.2, 8.4.4, 8.5.2, 8.6.3, 8.7.3, 8.8.4, 8.9.3, 9.0.4, 9.1.2, 9.2.3, 9.3.4, 9.4.3, 9.5.4, 9.6.3, 9.7.2, 9.8.2, 9.9.2, 10.0.1, 10.1.1, 10.2.2, 10.3.1, 10.4.1, 10.5.2, 10.6.2, 10.7.1, 10.8.1, 10.9.2, 11.0.1, 11.1.3, 11.2.1, 11.3.3, 11.4.1, 11.5.2, 11.6.1, 11.7.2, 11.8.5, 11.9.2, 12.0.1, 12.1.1.

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!