29 April 2015

WordPress has released a critical update to address a vulnerability that potentially leaves millions of websites worldwide open to attack.

The developers behind the content management system issued the update after researchers released a proof-of-concept exploit showing how an attacker could hijack a website running a vulnerable version of WordPress.

An attacker can insert script into a comment field on a WordPress website. The script is triggered when the infected comment is viewed. If the script is triggered by the website’s logged-in administrators, the attacker may be able to execute code on the server and change the administrators’ passwords, create new administrator accounts and access all other administrator privileges and tasks.

WordPress website administrators are advised to disable comments, including not approving any new comments until they apply the update. They should apply the update as quickly as possible.

Administrators should also strongly consider automating WordPress updates.

WordPress last week also issued a critical update to address multiple vulnerabilities, including a vulnerability that could enable an anonymous user to compromise a WordPress website. 

More information

How to set automatic updates on your computer.

The information provided here is of a general nature. Everyone's circumstances are different. If you require specific advice you should contact your local technical support provider.


Thank you to those subscribers who have provided feedback to our Alerts and Newsletters. We are very interested in your feedback and where possible take on board your suggestions or requests.


This information has been prepared by Enex TestLab for the Department of Communications ('the Department'). It was accurate and up to date at the time of publishing.

This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.

The Commonwealth, Enex TestLab, and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.

Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.

Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.


Facebook: www.facebook.com/staysmartonline
Email: staysmartonline [at] communications.gov.au

© 2013 Australian Government. All rights reserved


Connect with Stay Smart Online