Forum Moderators: rogerd & travelin cat
WordPress Critical Persistent XSS Zero Day Vulnerability: Comment Posting
If your WordPress site allows users to post comments via the WordPress commenting system, you’re at risk. An attacker could leverage a bug in the way comments are stored in the site’s database to insert malicious scripts on your site, thus potentially allowing them to infect your visitors with malware, inject SEO spam or even insert backdoor in the site’s code if the code runs when in a logged-in administrator browser.
You should definitely disable comments on your site until a patch is made available or leverage a WAF to protect your site and customers. WordPress Critical Persistent XSS Zero Day Vulnerability: Comment Posting [blog.sucuri.net]
The vulnerability is present in WordPress version 4.2 and below. Pynnönen revealed the flaw on his blog on Sunday before the WordPress team could release a patch for the software: the researcher feared WordPress would take too long to fix the hole, and wanted to warn everyone beforehand.
“Your best option is to install Akismet (which has already been configured to block this attack), or disable comments,” core contributor Gary Pendergast said...
"WordPress users can also temporarily disable comments in the meantime until the patch has been issued by the WordPress security team."
http://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched [wptavern.com]
I would gladly update to 4.2.1 but none of the plugins I use have been confirmed to work with it (not saying they WON'T work with it, just not sure that they will since their status is "unknown."