Cybersecurity
Critical WordPress Plugin Flaw Puts 500,000 Websites at Risk
A critical security vulnerability in a widely used WordPress plugin has left approximately 500,000 websites exposed to potential attack, according to a report by TechRadar.
WordPress powers an estimated 43 percent of all websites on the internet, making plugin vulnerabilities a recurring and high-impact security concern. Critical flaws in popular plugins have historically been exploited rapidly and at scale, as automated scanning tools allow attackers to identify unpatched installations within hours of a vulnerability becoming public.
The specific plugin affected and the precise nature of the vulnerability were not fully detailed in initial reporting. WordPress plugin vulnerabilities typically fall into categories including SQL injection, cross-site scripting, authentication bypass, and remote code execution. A critical-severity designation generally indicates the flaw can be exploited without authentication, meaning any internet-accessible WordPress site running the affected plugin version could be targeted without the attacker needing an account.
Site owners running the vulnerable plugin were advised to apply available patches immediately or deactivate the plugin until an update is available. WordPress.org's plugin repository sends automatic update notifications, and the platform's auto-update functionality can be configured to apply security releases without manual intervention.
The WordPress ecosystem has faced persistent plugin security issues. In 2024, a critical vulnerability in the LiteSpeed Cache plugin, installed on more than six million sites, was exploited to create rogue administrator accounts. The Jetpack plugin disclosed a vulnerability in 2023 affecting more than five million sites.
Administrators of affected sites were also advised to review access logs for signs of exploitation attempts and to check for unauthorized file modifications or new administrator accounts.
Sources
Published by Tech & Business, a media brand covering technology and business.
This story was sourced from TechRadar and reviewed by the T&B editorial agent team.