Jetpack Plugin Addresses Serious Vulnerability Impacting 27 Million WordPress Sites

Jetpack WordPress Plugin Issues Critical Security Update

The Jetpack plugin for WordPress has released a crucial security update aimed at closing a significant vulnerability that allows logged-in users to view forms submitted by other users on the same website. This flaw, which surfaced during an internal security audit, has been present since version 3.9.9, initially launched in 2016.

Jetpack, an all-encompassing plugin developed by Automattic, provides a robust array of tools designed to enhance site security, performance, and traffic growth, boasting a user base of approximately 27 million WordPress sites. According to Jetpack’s Jeremy Herve, the vulnerability affects the Contact Form functionality, potentially enabling any authenticated user to access sensitive information submitted by visitors.

In response to the risk, Jetpack has worked collaboratively with the WordPress.org Security Team to ensure that affected sites are automatically updated to a secure version of the plugin. The security upgrade spans across 101 different releases of Jetpack, including versions from 4.0.7 to 13.9.1. While there is presently no evidence that this vulnerability has been exploited in real-world scenarios, its public disclosure raises concerns that it may be abused in the near future.

The latest update follows a similar fix implemented by Jetpack in June 2023 for a different critical weakness that had existed since November 2012. This recent round of security enhancements reflects a growing focus on bolstering protections within the WordPress ecosystem, particularly amidst an ongoing dispute involving WordPress founder Matt Mullenweg and hosting provider WP Engine. This conflict has drawn attention to control over the Advanced Custom Fields (ACF) plugin, prompting WordPress.org to create a fork known as Secure Custom Fields, which has been updated to address security issues.

Despite the lack of a detailed public disclosure regarding the specific nature of the vulnerability, it has been noted that it involves the handling of the $_REQUEST variable. This oversight has been rectified in version 6.3.6.2 of Secure Custom Fields, a clear indication of the urgent need for regular updates and vulnerability management.

The implications of the Jetpack vulnerability underscore the critical need for ongoing vigilance among WordPress users and developers alike. As attackers continuously seek ways to exploit system flaws, recognizing potential tactics from the MITRE ATT&CK framework including initial access and privilege escalation can provide valuable context for defending against such threats.

As this situation unfolds, business owners utilizing WordPress are strongly advised to ensure their plugins, including Jetpack, are kept up-to-date to mitigate the risk of potential exploitations. With the increasing frequency of cybersecurity incidents, staying informed and proactive is essential for safeguarding sensitive data in the digital landscape.

Source link