TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WordPress XSS 0day

9 pointsby jchavannesabout 10 years ago

2 comments

lol768about 10 years ago
The blogpost linked (<a href="http:&#x2F;&#x2F;klikki.fi&#x2F;adv&#x2F;wordpress2.html" rel="nofollow">http:&#x2F;&#x2F;klikki.fi&#x2F;adv&#x2F;wordpress2.html</a>) in the article is rather worrying to read - especially the &quot;Solution&quot; section which suggests Klikki Oy had a lot of trouble communicating with WordPress and getting the bug fixed.<p>Interestingly, the WordPress blog states &quot;A few hours ago, the WordPress team was made aware of a cross-site scripting vulnerability, which could enable commenters to compromise a site. The vulnerability was discovered by Jouko Pynnönen.&quot;<p>I&#x27;m not very familiar with WordPress or its plugins, but does it make use of Content-Security-Policy headers? Those might&#x27;ve helped to minimise the risk (at least for users with modern browsers) to users browsing WordPress sites.
评论 #9448917 未加载
breakingcupsabout 10 years ago
Let&#x27;s wait on the obligatory Cloudflare blogpost talking about how their paying customers are protected.