WordPress Plugins and Themes Security Vulnerability
This is a general announcement for all buyers of WordPress items to bring your attention to an XSS vulnerability affecting multiple WordPress plugins and themes. The vulnerability is caused by a common code pattern used in WordPress plugins and themes available from the wordpress.org website and other sources. Anyone using a WordPress website, regardless of where the theme or plugin was sourced, needs to be aware of this and take immediate action to ensure it is secure.
What should I do?
As there is no simple way of knowing exactly which plugins or themes are affected, and the issue is widespread, our best advice is to periodically check for updates to any WordPress themes or plugins you are using and apply those available as soon as possible.
Aqaba is actively working with all clients, explaining the issue and asking them to check that their items are secure and to update them if necessary. We expect WordPress items to be continuously updated over the coming weeks, with the majority updated in the next few days. Updates may be downloaded from the Downloads page as they become available.
If you would like to be automatically notified about new updates, please initiate a work order by logging into our project management portal by clicking here or calling our office @ 248.275.1222 ex 120.
For updates to items obtained from other sources, please check the Plugins and Themes pages in the WordPress Admin area or contact the source of the product. We strongly recommend continuing to check for updates, especially over the next few weeks, but also on an ongoing basis. It is important to always keep your WordPress installation and associated plugins and themes up to date.
If you still have concerns, we suggest engaging an experienced WordPress developer @ Aqaba to check whether your site is affected.
More details are available via the following links:
• https://blog.sucuri.net/2015/04/security-advisory-xss-vul…
• http://wptavern.com/xss-vulnerability-affects-more-than-a…
• https://poststatus.com/coordinated-plugin-updates-to-addr…