{"id":533,"date":"2017-05-05T11:18:39","date_gmt":"2017-05-05T18:18:39","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=533"},"modified":"2017-05-05T11:18:39","modified_gmt":"2017-05-05T18:18:39","slug":"unpatched-wordpress-flaw-could-allow-hackers-to-reset-admin-password","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/unpatched-wordpress-flaw-could-allow-hackers-to-reset-admin-password\/","title":{"rendered":"Unpatched WordPress Flaw Could Allow Hackers To Reset Admin Password"},"content":{"rendered":"<p>For all you do-it-yourself-ers, this is why it&#8217;s important to stay current on your core, theme, and plugin updates. \u00a0If you can&#8217;t find the time, hire me, or another professional, to do it consistently. \u00a0Most updates should not be considered &#8220;optional.&#8221; \u00a0They are done to stay ahead of hackers or fix exploit flaws.<\/p>\n<blockquote><p>WordPress, the most popular CMS in the world, is vulnerable to a logical vulnerability that could allow a remote attacker to reset targeted users\u2019 password under certain circumstances.<\/p>\n<p>The vulnerability (CVE-2017-8295) becomes even more dangerous after knowing that it affects all versions of WordPress \u2014 including the latest 4.7.4 version.<\/p>\n<p>The WordPress flaw was discovered by Polish security researcher Dawid Golunski of <a href=\"https:\/\/legalhackers.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Legal Hackers<\/a> last year in July and reported it to the WordPress security team, who decided to ignore this issue, leaving millions of websites vulnerable.<\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2017\/05\/hacking-wordpress-blog-admin.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&amp;_m=3n.009a.1487.qm0ao08yu9.vwz\">Read the article&#8230;<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/thehackernews.com\/2017\/05\/hacking-wordpress-blog-admin.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&amp;_m=3n.009a.1487.qm0ao08yu9.vwz\">Unpatched WordPress Flaw Could Allow Hackers To Reset Admin Password<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For all you do-it-yourself-ers, this is why it&#8217;s important to stay current on your core, theme, and plugin updates. \u00a0If you can&#8217;t find the time, hire me, or another professional, to do it consistently. \u00a0Most updates should not be considered &#8220;optional.&#8221; \u00a0They are done to stay ahead of hackers or fix exploit flaws. WordPress, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,8],"tags":[],"class_list":["post-533","post","type-post","status-publish","format-standard","hentry","category-security-2","category-software"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=533"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/533\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}