Critical Security Vulnerability in Jetpack Plugin Affects Millions of WordPress Websites
Jetpack, a popular WordPress plugin developed by Automattic, has released a critical security update today, addressing a vulnerability that has the potential to impact millions of websites. Installed on over 27 million sites worldwide, Jetpack is a staple tool for enhancing website functionality, security, and performance.
Earlier today, version 13.9.1 of Jetpack was released, containing a critical security patch. According to the security bulletin, “While we have no evidence that this vulnerability has been exploited yet, please update your version of Jetpack as soon as possible to ensure the security of your site.” Jetpack users are urged to act immediately, as the vulnerability, though not yet exploited, presents a significant risk now that details have been disclosed.
The vulnerability, which has existed since version 3.9.9, relates to Jetpack’s Contact Form feature. This flaw could potentially allow logged-in users to read forms submitted by site visitors, posing a privacy and data security threat. Jetpack stated that they discovered this issue during an internal security audit.
To mitigate this issue, Automattic has collaborated closely with the WordPress.org Security Team to release patched versions for every iteration of Jetpack since 3.9.9. Jetpack confirmed, “Most websites have been or will soon be automatically updated to a secured version.” They also provided a comprehensive list of 101 different versions of Jetpack that were patched today, ensuring that no user remains vulnerable.
Although there is no evidence that this vulnerability has been exploited in the wild, Automattic acknowledged the risk, cautioning that “now that the update has been released, it is possible that someone will try to take advantage of this vulnerability.” This emphasizes the importance of updating immediately to secure affected websites.
Website owners using Jetpack are strongly urged to confirm they are running the latest version to ensure their site is protected. Automattic has apologized for any inconvenience caused by this vulnerability and reiterated its commitment to ongoing security audits.
“We will continue to regularly audit all aspects of our codebase to ensure that your Jetpack site remains safe,” the company stated.