5 June 2014

An update has been released to address a security vulnerability identified in a WordPress plugin called ‘All in One SEO Pack’.

If you have a WordPress site that uses the All in One SEO Pack, you should update to the latest version of the plugin (2.6.1).

An attacker could use this vulnerability to affect the plugin or introduce other malware to affect your site.

WordPress is free, open source software that is used by many websites. It uses plugins to add features and capabilities to the websites.

WordPress logon authentication unsecure

In a separate issue, Electronic Frontier Foundation researcher Yan Zhu has recently documented an authentication vulnerability affecting logon for WordPress.com and WordPress software based sites.

Users are advised that accounts may be vulnerable to hijacking during logon under certain conditions, circumventing two-factor authentication.

WordPress.com (a blogging and hosting service owned by AutoMattic) advised tech website Ars Technica, that this issue should soon be fixed.

It also added that for websites running WordPress software, improvements to SSL support (we assume addressing this issue) ‘are slated’ for the next scheduled update (the next major release is estimated to be August 13).

Until this issue is fixed, Zhu suggests that users should avoid logging on to WordPress.com sites using unsecured (e.g. public wi-fi) networks if the sites do not use full HTTPS.

Zhu provides further technical recommendations, detail and analysis on her blog.

More information

CSO article discussing the All in One SEO Pack plugin vulnerability.

Ars Technica’s article discussing Yan Zhu’s authentication vulnerability.

The information provided here is of a general nature. Everyone's circumstances are different. If you require specific advice you should contact your local technical support provider.


Thank you to those subscribers who have provided feedback to our Alerts and Newsletters. We are very interested in your feedback and where possible take on board your suggestions or requests.


This information has been prepared by Enex TestLab for the Department of Communications ('the Department'). It was accurate and up to date at the time of publishing.

This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.

The Commonwealth, Enex TestLab, and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.

Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.

Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.


Facebook: www.facebook.com/staysmartonline
Email: staysmartonline [at] communications.gov.au
Web: www.staysmartonline.gov.au
You are receiving this message at the address [Email].
Update your profile preferences
If you no longer wish to receive this information, you can unsubscribe.

© 2013 Australian Government. All rights reserved

Connect with Stay Smart Online