<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Bad WordPress hole found</title>
	<atom:link href="http://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 15:47:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/11/24/bad-wordpress-hole-found/comment-page-1/#comment-1299486</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 24 Nov 2014 17:33:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28574#comment-1299486</guid>
		<description><![CDATA[Four-year-old comment security bug affects 86 percent of WordPress sites
Bug allows script attack that could be used to hijack sites or attack visitors.
http://arstechnica.com/security/2014/11/four-year-old-comment-security-bug-affects-86-percent-of-wordpress-sites/

A Finnish IT company has uncovered a bug in WordPress 3 sites that could be used to launch a wide variety of malicious script-based attacks on site visitors’ browsers. Based on current WordPress usage statistics, the vulnerability could affect up to 86 percent of existing WordPress-powered sites.

The vulnerability, discovered by Jouko Pynnonen of Klikki Oy, allows an attacker to craft a comment on a blog post that includes malicious JavaScript code. On sites that allow comments without authentication—the default setting for WordPress—this could allow anyone to post malicious scripts within comments that could target site visitors or administrators.]]></description>
		<content:encoded><![CDATA[<p>Four-year-old comment security bug affects 86 percent of WordPress sites<br />
Bug allows script attack that could be used to hijack sites or attack visitors.<br />
<a href="http://arstechnica.com/security/2014/11/four-year-old-comment-security-bug-affects-86-percent-of-wordpress-sites/" rel="nofollow">http://arstechnica.com/security/2014/11/four-year-old-comment-security-bug-affects-86-percent-of-wordpress-sites/</a></p>
<p>A Finnish IT company has uncovered a bug in WordPress 3 sites that could be used to launch a wide variety of malicious script-based attacks on site visitors’ browsers. Based on current WordPress usage statistics, the vulnerability could affect up to 86 percent of existing WordPress-powered sites.</p>
<p>The vulnerability, discovered by Jouko Pynnonen of Klikki Oy, allows an attacker to craft a comment on a blog post that includes malicious JavaScript code. On sites that allow comments without authentication—the default setting for WordPress—this could allow anyone to post malicious scripts within comments that could target site visitors or administrators.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
