The developers of the Akismet plugin for WordPress have released an update to address a critical vulnerability that exposes websites to hacker attacks.
Created by Automattic, the company behind the WordPress.com platform, the Akismet plugin is designed to check comments posted on websites for spam by running them through the Akismet web service. Administrators can review the comments flagged as spam from their blog’s “Comments” section in the admin panel.
Researchers at Sucuri discovered at the beginning of October a stored cross-site scripting (XSS) vulnerability in Akismet that allows an unauthenticated attacker to insert malicious code into the comments section of the WordPress administration panel.
While there are some systems in place to prevent hackers from inserting malicious code as comments, researchers managed to bypass the restrictions by using emoticons. More precisely, experts found a way to inject arbitrary code via comments on websites that automatically convert strings like “:-)” and “:-P” to graphic emoticons on display, a feature that is enabled by default on WordPress sites.
According to experts, the vulnerability affects Akismet 3.1.4 and earlier versions. The developers of Akismet patched the flaw earlier this week with the release of version 3.1.5.
Akismet is currently installed on more than 1 million WordPress websites so there are plenty of potential victims for attackers to choose from. Fortunately, the WordPress.org plugins team has enabled an automatic update for sites running affected version of Akismet. Furthermore, even if users haven’t installed the update, attack attempts are actively blocked by Akismet during the comment-check API call.
While measures have been taken to prevent abuse and while there is no evidence that the vulnerability has been exploited in the wild, users are advised to update their installations as soon as possible.
Earlier this month, Sucuri reported finding a stored XSS vulnerability in Jetpack, a WordPress plugin that also has more than one million active installs. Such security holes can pose a serious threat since the attacker doesn’t necessarily need to lure victims, and instead they can inject the malicious code into the targeted website and wait for the user to access it while performing regular activities.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
