<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Word Press Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/wordpress/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/wordpress/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Wed, 30 Jun 2021 12:28:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</title>
		<link>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/</link>
					<comments>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 12 Feb 2018 15:08:57 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=3567</guid>

					<description><![CDATA[<p>This entry was posted in General Security, WordPress Security on February 11, 2018 by Mark Maunder . In the past 24 hours, Security researcher Scott Helme discovered that a third party accessibility plugin called ‘Browsealoud’ had their servers compromised. The plugin relies on a website including Javascript in their content in order to work.  [...]</p>
<p>The post <a href="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/">Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<div class="post-title">
<div style="text-align: left;" align="left">
<p>This entry was posted in <a href="https://www.wordfence.com/blog/category/general-security/" rel="category tag">General Security</a>, <a href="https://www.wordfence.com/blog/category/wordpress-security/" rel="category tag">WordPress Security</a> on February 11, 2018 by <a href="https://www.wordfence.com/blog/author/mark/">Mark Maunder</a> .</p>
</div>
</div>
<p>In the past 24 hours, Security researcher <a href="https://twitter.com/Scott_Helme" target="_blank" rel="noopener noreferrer">Scott Helme</a> discovered that a third party accessibility plugin called ‘Browsealoud’ had their servers compromised. The plugin relies on a website including Javascript in their content in order to work. This compromise resulted in over 4,000 websites serving up cryptomining malware.</p>
<p>The malware uses site visitor CPUs to mine for Monero cryptocurrency. The sites that use Browsealoud included the UK Information Commissioner’s office, UK National Health Service websites, an Australian provincial government website and <a href="https://twitter.com/Scott_Helme/status/962810451817041920" target="_blank" rel="noopener noreferrer">many more</a>.</p>
<p>Texthelp is the company that makes the Browsealoud plugin. They <a href="https://www.texthelp.com/en-gb/company/corporate-blog/february-2018/data-security-investigation-underway-at-texthelp/" target="_blank" rel="noopener noreferrer">are reporting</a> that their product was infected for four hours, affecting sites that use the Browsealoud plugin before it was take offline. The product remains offline while they investigate.</p>
<h2>Cryptomining Attacks On The Rise</h2>
<p>In November we <a href="https://www.wordfence.com/blog/2017/11/wordpress-plugin-banned-crypto-mining/" target="_blank" rel="noopener noreferrer">wrote about a WordPress plugin that was banned for including cryptomining code</a>, specifically CoinHive code that mines <a href="https://en.wikipedia.org/wiki/Monero_(cryptocurrency)" target="_blank" rel="noopener noreferrer">Monero</a> currency. In that case, if a website used the banned plugin, any visitor to the site would see their browser CPU resources exploited to mine Monero and the proceeds were aggregated using CoinHive and sent to the plugin owner. Back then I included a <a href="https://www.youtube.com/watch?time_continue=2&amp;v=jIzyZAkMusM" target="_blank" rel="noopener noreferrer">video showing how CPU fan speed increases as the workload increases</a> from Monero mining.</p>
<p>In December of last year, we wrote about a <a href="https://www.wordfence.com/blog/2017/12/massive-cryptomining-campaign-wordpress/" target="_blank" rel="noopener noreferrer">massive Monero cryptomining attack campaign that targeted WordPress</a>.</p>
<p>Scott <a href="https://scotthelme.co.uk/protect-site-from-cyrptojacking-csp-sri/" target="_blank" rel="noopener noreferrer">reports</a> that this campaign also used CoinHive code to mine Monero and send the proceeds back to the attacker.</p>
<h2>Supply Chain Attacks Have Wide Impact</h2>
<p>On January 2nd of this year, my colleague <a href="https://www.wordfence.com/blog/2018/01/wordpress-supply-chain-attacks/" target="_blank" rel="noopener noreferrer">Dan Moen wrote about the emerging threat of supply chain attacks</a>. He had mentioned to me that, in light of the rise in supply chain attacks we saw in 2017 targeting WordPress, it is quite likely that 2018 is going to see a large number of these kinds of attacks affecting site owners and we had better get the word out, which we did.</p>
<p>As Dan <a href="https://www.wordfence.com/blog/2018/01/wordpress-supply-chain-attacks/" target="_blank" rel="noopener noreferrer">wrote</a> in January, “In the software industry, a supply chain attack exploits a trusted relationship between software vendors or authors and their customers.”. In that post we were focused on discussing the risk of compromised plugins affecting thousands of WordPress sites.</p>
<p>This is another kind of supply chain attack that affects the “trusted relationship between software vendors or authors and their customers”. You trust a service distributing Javascript to maintain site security. If that service is compromised, it affects any website using that code – potentially thousands of websites. As is the case with WordPress plugins, Javascript supply chain attacks allow a malicious actor to compromise thousands of websites with a single hack.</p>
<p>In the case of Browsealoud, the incident could have been much worse. The attacker could have stolen credentials from government websites in multiple countries. Instead, they simply exploited the CPU resources of site visitors to mine Monero cryptocurrency.</p>
<h2>How To Protect Your Site and Site Visitors From JS Supply Chain Attacks</h2>
<p>There is an easy way to protect yourself against Javascript supply chain attacks using a security feature called <a href="https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity" target="_blank" rel="noopener noreferrer"><em>Subresource Integrity, or SRI</em></a>. If you are including javascript code from an external source using the &lt;SCRIPT&gt; tag, simply include an ‘integrity’ attribute which will cause browsers to not load the script if it is modified from the original version.</p>
<p>Normally you’ll include a script like this:</p>
<p><a href="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-18921" src="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png" sizes="(max-width: 544px) 100vw, 544px" srcset="https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery.png 544w, https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery-150x28.png 150w, https://www.wordfence.com/wp-content/uploads/2018/02/insecure-jquery-300x55.png 300w" alt="" width="544" height="100" /></a></p>
<p>To secure your site against JS supply chain attacks, change it to:</p>
<p><a href="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png"><img decoding="async" class="alignnone size-full wp-image-18922" src="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png" sizes="(max-width: 644px) 100vw, 644px" srcset="https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure.png 644w, https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure-150x36.png 150w, https://www.wordfence.com/wp-content/uploads/2018/02/jquery-secure-300x72.png 300w" alt="" width="644" height="154" /></a></p>
<p>Making this change is easy. You can <a href="https://report-uri.com/home/sri_hash" target="_blank" rel="noopener noreferrer">visit this page to generate a hash and the inclusion code</a> from a script URL.</p>
<p>The ‘integrity’ attribute contains a ‘hash’ that uniquely identifies the content of the script. If that content changes, the browser can recognize that it has changed and will refuse to load the script. This gives site owners back control over what they load from remote servers, by refusing to load code that has changed from the original version.</p>
<p>You should be aware that once you use SRI and include a hash for your scripts, if the vendor changes the script, it will not load. This has the benefit of protecting your site visitors if a hacker compromises the vendor site and injects malware into the javascript that you are loading. But it also has the side effect that if a vendor updates their code at that same URL, your script will no longer load.</p>
<p>Some legacy vendors may rely on the ability to update their code at a URL whenever they please and have your site simply load the new code without you taking action. If a vendor includes a version number in the script URL, as in the jQuery URL above, then you probably don’t have to worry about this. But if the URL is something like //example.com/source/code/lives/here.js and there is no version specified, then check with the vendor to find out whether they will be updating the script you are using. They may need to notify you when they perform updates to avoid service interruptions.</p>
<p>In general I would avoid any vendor that insists on the ability to remotely update code without you making a change to your website code. It’s a security risk, as this case illustrates.</p>
<h2>Javascript Supply Chain Attacks Are Real-Time</h2>
<p>The thing that differentiates a JS supply chain attack from other forms is that, once the attacker installs their malicious code, victims are instantly affected. No action is required by the site administrator or site visitors. Code is being loaded per visit from the compromised server and the moment a code change is made, it is active in victim browsers.</p>
<p>This is different from application supply chain attacks or WordPress plugin supply chain attacks. An application supply chain attack needs a compromised application to be distributed before it exploits users. Desktop or mobile users need to upgrade to the new version before they are effected. Even if an auto-update is pushed out by the attacker somehow, there will be some delay before it is effective.</p>
<p>A WordPress plugin supply chain attack needs site owners to update to the new compromised plugin version before it is active. Javascript supply chain attacks are instantly active and being loaded by site visitors as soon as the attacker saves the file to the distribution web server. That is why it is critically important to use SRI for all external scripts on your site.</p>
<p>Please spread the word about the risk of Javascript supply chain attacks and how to mitigate them using Subresource Integrity or SRI.</p>
<div class="fm_social_share">
<p><strong>Did you enjoy this post? Share it!</strong></p>
</div>

		</div>
	</div>
</div></div></div></div>
</div><p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&amp;linkname=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fcryptomining-supply-chain-attack-hits-government-websites%2F&#038;title=Crypto-Mining%20Supply%20Chain%20Attack%20Hits%20UK%20Gov%E2%80%99t%20websites" data-a2a-url="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/" data-a2a-title="Crypto-Mining Supply Chain Attack Hits UK Gov’t websites"></a></p><p>The post <a href="https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/">Crypto-Mining Supply Chain Attack Hits UK Gov&#8217;t websites</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/cryptomining-supply-chain-attack-hits-government-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Update of WordPress to 4.8</title>
		<link>https://cvtfstudios.net/update-wordpress-4-8/</link>
					<comments>https://cvtfstudios.net/update-wordpress-4-8/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 09 Jun 2017 16:05:56 +0000</pubDate>
				<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3471</guid>

					<description><![CDATA[<p>WordPress 4.8 “Evans” Posted June 8, 2017 by Matt Mullenweg. Filed under Releases. An Update with You in Mind Gear up for a more intuitive WordPress! Version 4.8 of WordPress, named “Evans” in honor of jazz pianist and composer William John “Bill” Evans, is available for download or update in your WordPress dashboard. New features in 4.8 add  [...]</p>
<p>The post <a href="https://cvtfstudios.net/update-wordpress-4-8/">Update of WordPress to 4.8</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2017/06/evans/">WordPress 4.8 “Evans”</a></h2>
<div class="meta">Posted June 8, 2017 by <a href="https://profiles.wordpress.org/matt">Matt Mullenweg</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>.</div>
<div class="storycontent">
<h2>An Update with You in Mind</h2>
<h3>Gear up for a more intuitive WordPress!</h3>
<p>Version 4.8 of WordPress, named “Evans” in honor of jazz pianist and composer William John “Bill” Evans, is available for download or update in your WordPress dashboard. New features in 4.8 add more ways for you to express yourself and represent your brand.</p>
<p>Though some updates seem minor, they’ve been built by hundreds of contributors with <em>you</em> in mind. Get ready for new features you’ll welcome like an old friend: link improvements, <em>three</em> new media widgets covering images, audio, and video, an updated text widget that supports visual editing, and an upgraded news section in your dashboard which brings in nearby and upcoming WordPress events.</p>
<hr />
<h2>Exciting Widget Updates</h2>
<p><center><br />
<img decoding="async" class="wp-image-4776 aligncenter" src="https://i1.wp.com/wordpress.org/news/files/2017/06/widgets-with-all-four.png?resize=632%2C436&amp;ssl=1" sizes="(max-width: 632px) 100vw, 632px" srcset="https://i1.wp.com/wordpress.org/news/files/2017/06/widgets-with-all-four.png?resize=1024%2C706&amp;ssl=1 1024w, https://i1.wp.com/wordpress.org/news/files/2017/06/widgets-with-all-four.png?resize=300%2C207&amp;ssl=1 300w, https://i1.wp.com/wordpress.org/news/files/2017/06/widgets-with-all-four.png?resize=768%2C530&amp;ssl=1 768w, https://i1.wp.com/wordpress.org/news/files/2017/06/widgets-with-all-four.png?w=1264&amp;ssl=1 1264w" alt="" width="862" height="595" /></center></div>
<div>
<h3></h3>
<hr />
<h3>Image Widget</h3>
<p>Adding an image to a widget is now a simple task that is achievable for any WordPress user without needing to know code. Simply insert your image right within the widget settings. Try adding something like a headshot or a photo of your latest weekend adventure — and see it appear automatically.</p>
<h3>Video Widget</h3>
<p>A welcome video is a great way to humanize the branding of your website. You can now add any video from the Media Library to a sidebar on your site with the new Video widget. Use this to showcase a welcome video to introduce visitors to your site or promote your latest and greatest content.</p>
<h3>Audio Widget</h3>
<p>Are you a podcaster, musician, or avid blogger? Adding a widget with your audio file has never been easier. Upload your audio file to the Media Library, go to the widget settings, select your file, and you’re ready for listeners. This would be a easy way to add a more personal welcome message, too!</p>
<h3>Rich Text Widget</h3>
<p>This feature deserves a parade down the center of town! Rich-text editing capabilities are now native for Text widgets. Add a widget anywhere and format away. Create lists, add emphasis, and quickly and easily insert links. Have fun with your newfound formatting powers, and watch what you can accomplish in a short amount of time.</p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&amp;linkname=Update%20of%20WordPress%20to%204.8" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fupdate-wordpress-4-8%2F&#038;title=Update%20of%20WordPress%20to%204.8" data-a2a-url="https://cvtfstudios.net/update-wordpress-4-8/" data-a2a-title="Update of WordPress to 4.8"></a></p><p>The post <a href="https://cvtfstudios.net/update-wordpress-4-8/">Update of WordPress to 4.8</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/update-wordpress-4-8/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to find and replace text with one click in your WordPress database</title>
		<link>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/</link>
					<comments>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 24 Apr 2016 12:01:29 +0000</pubDate>
				<category><![CDATA[Design]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[find and replace WP text]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3413</guid>

					<description><![CDATA[<p>    Last updated on April 21st, 2016 by Editorial Staff Share This Article Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a  [...]</p>
<p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="horizontalsocial" dir="LTR"> <img decoding="async" class="alignnone size-full wp-image-3414" src="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png" alt="find-and-replace-text-in-wordpress" width="589" height="491" srcset="https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-300x250.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress-500x417.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/04/find-and-replace-text-in-wordpress.png 589w" sizes="(max-width: 589px) 100vw, 589px" /></div>
<p>&nbsp;</p>
<h6>Last updated on April 21st, 2016 by <a href="https://www.wpbeginner.com/author/wpbeginner/">Editorial Staff</a></h6>
<div id="horizontalsocial" dir="LTR">
<p>Share This Article</p>
</div>
<p>Are you looking to do a mass search and replace in WordPress? Whether you want to find and replace a specific text, URL, or an image, you can easily do so by using a find and replace WordPress plugin or a simple SQL query. In this article, we will show you how to find and replace text in your WordPress database.</p>
<h4 class="western">When You May Need Find &amp; Replace for WordPress Database?</h4>
<p>Let’s suppose that you have added specific text or URL to a number of your posts. You don’t know which posts you have added that text to, but you do know that there are a lot of them.</p>
<p>Now you can manually search your site and edit every single post one by one. That’s going to take time and has a high chance of you missing some occurrences.</p>
<p>Using a single command to automatically find and replace will do the same thing but much quicker and efficiently.</p>
<p>There is one downside to it though. If you made a mistake, then you will not be able to undo it. Once you replace the text, it is gone. You will need to carefully type the text you are looking for and the text you want to replace it with.</p>
<p>Having said that, let’s see how you can easily find and replace text in your WordPress database.</p>
<h4 class="western">Getting Started</h4>
<p>As we mentioned earlier that the changes you make to your database will not be reversible. You need to take every precaution to make sure that you don’t lose data.</p>
<p>First you need to create a WordPress database backup. You can do that by using a <a href="https://www.wpbeginner.com/plugins/7-best-wordpress-backup-plugins-compared-pros-and-cons/">WordPress backup plugin</a>. Alternatively, you can also create a <a href="https://www.wpbeginner.com/beginners-guide/how-to-make-a-wordpress-database-backup-manually/">database backup using phpMyAdmin</a>.</p>
<p>After creating the backup of your WordPress database, you can move on to run your find and replace commands.</p>
<h4 class="western">Running Find and Replace with a WordPress plugin</h4>
<p>If you are not familiar with code and don’t want to write a custom SQL query, then there is an easy to use find and replace WordPress plugin called <a href="https://wordpress.org/plugins/better-search-replace/" target="_blank" rel="noopener">Better Search Replace</a>.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn2.wpbeginner.com/wp-content/uploads/2009/10/search-replace-db.png" alt="Better search replace plugin settings" width="520" height="466" name="graphics5" align="BOTTOM" border="0" /></p>
<p>It allows you to run search and replace commands from inside your WordPress admin area. We have a detailed guide on <a href="https://www.wpbeginner.com/plugins/search-and-replace-plugin-for-wordpress-database/">how to search and replace in WordPress with Better Search Replace plugin</a>.</p>
<h4 class="western">Running Find &amp; Replace MySQL Query with phpMyAdmin</h4>
<p>You can also use phpMyAdmin to find and replace text from your WordPress database.</p>
<p>First you need to login to cPanel dashboard of your <a href="https://www.wpbeginner.com/wordpress-hosting/">WordPress hosting</a>. Scroll down to the database section and then click on phpMyAdmin.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn3.wpbeginner.com/wp-content/uploads/2016/04/phpmyadmin.png" alt="phpMyAdmin" width="520" height="177" name="graphics6" align="BOTTOM" border="0" /></p>
<p>The screenshot above is showing the cPanel dashboard on <a href="https://www.wpbeginner.com/refer/bluehost/" target="_blank" rel="noopener">BlueHost</a>. Your cPanel dashboard may look slightly different.</p>
<p>This will launch phpMyAdmin where you will need to click on your WordPress database name and then click on SQL.</p>
<p><img decoding="async" class="aligncenter" src="https://cdn.wpbeginner.com/wp-content/uploads/2016/04/phpmyadminsql.png" alt="Running SQL query in phpMyAdmin" width="520" height="259" name="graphics7" align="BOTTOM" border="0" /></p>
<p>You will need to enter your SQL query in this format:</p>
<p><code class="western">update</code> <code class="western">TABLE_NAME set</code> <code class="western">FIELD_NAME </code></p>
<p><code class="western">replace(FIELD_NAME, 'Text to find', 'text to replace with'); </code></p>
<p>For example, if you wanted to search for text in a WordPress post’s content, then you would write your query like this:</p>
<p><code class="western">update</code> <code class="western">wp_posts set</code> <code class="western">post_content</code></p>
<p><code class="western">replace(post_content,'Text to find','text to replace with');</code></p>
<p>Click on the ‘Go’ button to continue.</p>
<p>PhpMyAdmin will run your SQL query and upon success it will show the number of rows affected by the query.</p>
<p>You can now visit your WordPress site to see your changes in action.</p>
<p>We hope this article helped you learn how to find and replace text with one click in your WordPress database. You may also want to see our beginner’s guide on <a href="https://www.wpbeginner.com/beginners-guide/beginners-guide-to-wordpress-database-management-with-phpmyadmin/">WordPress database management with phpMyAdmin</a>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&amp;linkname=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Ffind-replace-text-one-click-wordpress-database%2F&#038;title=How%20to%20find%20and%20replace%20text%20with%20one%20click%20in%20your%20WordPress%20database" data-a2a-url="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/" data-a2a-title="How to find and replace text with one click in your WordPress database"></a></p><p>The post <a href="https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/">How to find and replace text with one click in your WordPress database</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/find-replace-text-one-click-wordpress-database/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.4 Security and Maintenance Release</title>
		<link>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 04 Aug 2015 19:21:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WP Security and Maintenance Release]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2920</guid>

					<description><![CDATA[<p>WordPress 4.2.4 Security and Maintenance Release  Posted August 4, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><span style="color: #ff6600;"><a style="color: #ff6600;" href="https://wordpress.org/news/2015/08/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a></span></h2>
<div class="meta"><img decoding="async" class=" aligncenter" src="https://1.bp.blogspot.com/_wICHhTiQmrA/Sfg33R1tfZI/AAAAAAAADko/HM3HTRYJlQg/s1600/help1.PNG" alt="" width="754" height="397" /></div>
<div class="meta"></div>
<div class="meta"></div>
<div class="meta"> Posted August 4, 2015 by <a href="https://profiles.wordpress.org/samuelsidler">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.2.4 is now available. This is a<strong> security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by <a href="https://sucuri.net/">Marc-Alexandre Montpas</a> of Sucuri, <a href="https://helenhousandi.com/">Helen Hou-Sandí</a> of the WordPress security team, <a href="https://www.checkpoint.com/">Netanel Rubin</a> of Check Point, and <a href="https://hackerone.com/reactors08">Ivan Grigorov</a>. It also includes a fix for a potential timing side-channel attack, discovered by <a href="https://www.scrutinizer-ci.com/">Johannes Schmitt</a> of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by <a href="https://www.linkedin.com/in/symbiansymoh">Mohamed A. Baset</a>.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.4 also fixes four bugs. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.4">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=33573&amp;stop_rev=33396">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.4</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.4.</p>
<p><em>Already testing WordPress 4.3? The second release candidate is now available (<a href="https://wordpress.org/wordpress-4.3-RC2.zip">zip</a>) and it contains these fixes. For more on 4.3, see <a href="https://wordpress.org/news/2015/07/wordpress-4-3-release-candidate/">the RC 1 announcement post</a>.</em></p>
<div class="sharedaddy sd-sharing-enabled">
<div class="robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing">
<h3 class="sd-title">Share this:</h3>
</div>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-4-security-and-maintenance-release%2F&#038;title=WordPress%204.2.4%20Security%20and%20Maintenance%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/" data-a2a-title="WordPress 4.2.4 Security and Maintenance Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/">WordPress 4.2.4 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-4-security-and-maintenance-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.2 Security and Maintenance Release</title>
		<link>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 May 2015 22:04:03 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.2 Security and Maintenance Release]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2885</guid>

					<description><![CDATA[<p>WordPress 4.2.2 Security and Maintenance Release Posted May 7, 2015 by Samuel Sidler. Filed under Releases, Security. WordPress 4.2.2 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Version 4.2.2 addresses two security issues:   The Genericons icon font package, which  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="fancy"><a href="https://wordpress.org/news/2015/05/wordpress-4-2-2/">WordPress 4.2.2 Security and Maintenance Release</a></h2>
<p><a href="https://www.cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo.jpg"><img decoding="async" class=" size-medium wp-image-2886 alignleft" src="https://www.cvtfradio.net/wp-content/uploads/2015/05/WordPress-logo-300x159.jpg" alt="WordPress-logo" width="300" height="159" /></a>Posted May 7, 2015 by <a href="https://samuelsidler.com/">Samuel Sidler</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</p>
<div class="storycontent">
<p>WordPress 4.2.2 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Version 4.2.2 addresses two security issues:</p>
<p>&nbsp;</p>
<ul>
<li>The Genericons icon font package, which is used in a number of popular themes and plugins, contained an HTML file vulnerable to a cross-site scripting attack. All affected themes and plugins hosted on <a href="https://wordpress.org/">WordPress.org</a> (including the Twenty Fifteen default theme) have been updated today by the WordPress security team to address this issue by removing this nonessential file. To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it. Reported by Robert Abela of <a href="https://netsparker.com">Netsparker</a>.</li>
<li>WordPress versions 4.2 and earlier are affected by a <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/">critical cross-site scripting vulnerability</a>, which could enable anonymous users to compromise a site. WordPress 4.2.2 includes a comprehensive fix for this issue. Reported separately by Rice Adu and Tong Shi from Baidu[X-team].</li>
</ul>
<p>The release also includes hardening for a potential cross-site scripting vulnerability when using the visual editor. This issue was reported by Mahadev Subedi.</p>
<p>Our thanks to those who have practiced <a href="https://make.wordpress.org/core/handbook/reporting-security-vulnerabilities/">responsible disclosure</a> of security issues.</p>
<p>WordPress 4.2.2 also contains fixes for 13 bugs from 4.2. For more information, see the <a href="https://codex.wordpress.org/Version_4.2.2">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.2?rev=32418&amp;stop_rev=32324">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.2.2</a> or venture over to Dashboard → Updates and simply click “Update Now.” Sites that support automatic background updates are already beginning to update to WordPress 4.2.2.</p>
<p>Thanks to everyone who contributed to 4.2.2:</p>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&amp;linkname=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-2-security-and-maintenance-release%2F&#038;title=WordPress%204.2.2%20Security%20and%20Maintenance%20Release" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/" data-a2a-title="WordPress 4.2.2 Security and Maintenance Release"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/">WordPress 4.2.2 Security and Maintenance Release</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-2-security-and-maintenance-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WordPress 4.2.1 released new patch</title>
		<link>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/</link>
					<comments>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 27 Apr 2015 21:48:29 +0000</pubDate>
				<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[WordPress 4.2.1 released new patch]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2364</guid>

					<description><![CDATA[<p>WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability Sarah Gooding April 27, 2015 4 photo credit: Will Montague – ccThis morning we reported on an XSS vulnerability in WordPress 4.2, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and released 4.2.1  [...]</p>
<p>The post <a href="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<article id="post-42873" class="entry post publish author-sarah post-42873 format-standard has-post-thumbnail category-news category-wordpressorg post_tag-security">
<header class="entry-header">
<h1 class="entry-title font-headlines">WordPress 4.2.1 Released to Patch Comment Exploit Vulnerability</h1>
<div class="entry-byline font-secondary"><span class="entry-author"><a class="url fn n" title="Posts by Sarah Gooding" href="https://wptavern.com/author/sarah" rel="author">Sarah Gooding</a></span> <time class="entry-published updated" title="Monday, April 27, 2015, 3:46 pm" datetime="2015-04-27T15:46:07-04:00">April 27, 2015</time> <a class="comments-link" href="https://wptavern.com/wordpress-4-2-1-released-to-patch-comment-exploit-vulnerability#comments">4</a></div>
</header>
<div class="entry-content">
<figure id="attachment_20655" class="wp-caption aligncenter"><a class="img-hyperlink" href="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg" rel="prettyPhoto[42873]"><img decoding="async" class="size-full wp-image-20655" src="https://i2.wp.com/wptavern.com/wp-content/uploads/2014/04/security-release.jpg?resize=1024%2C505" alt="photo credit: Will Montague - cc" width="644" height="318" /></a><figcaption class="wp-caption-text font-secondary">photo credit: <a href="https://www.flickr.com/photos/willmontague/3813295674/">Will Montague</a> – <a href="https://creativecommons.org/licenses/by-nc/2.0/">cc</a></figcaption></figure>
<p>This morning we reported on an <a href="https://wptavern.com/zero-day-xss-vulnerability-in-wordpress-4-2-currently-being-patched" target="_blank">XSS vulnerability in WordPress 4.2</a>, 4.1.2, 4.1.1, and 3.9.3, which allows an attacker to compromise a site via its comments. The security team quickly patched the vulnerability and <a href="https://wordpress.org/news/2015/04/wordpress-4-2-1/" target="_blank">released 4.2.1</a> within hours of being notified.</p>
<p>WordPress’ official statement on the security issue:</p>
<blockquote><p>The WordPress team was made aware of a XSS issue a few hours ago that we will release an update for shortly. It is a core issue, but the number of sites vulnerable is much smaller than you may think because the vast majority of WordPress-powered sites run Akismet, which blocks this attack. When the fix is tested and ready in the coming hours WordPress users will receive an auto-update and should be safe and protected even if they don’t use Akismet.</p></blockquote>
<p>That auto-update is now being rolled out to sites where updates have not been disabled. If you are unsure of whether or not your site can perform automatic background updates, Gary Pendergast linked to the <a href="https://wordpress.org/plugins/background-update-tester/" target="_blank">Background Update Tester</a> plugin in the security release. This is a core-supported plugin that will check your site for background update compatibility and explain any issues.</p>
<p>Since <a href="https://wordpress.org/plugins/akismet/" target="_blank">Akismet</a> is active on more than a million websites, the number of affected users that were not protected is much smaller than it might have been otherwise.</p>
<p>WordPress 4.2.1 is a critical security release for a widely publicized vulnerability that you do not want to ignore. Users are advised to update immediately. The background update may already have hit your site. If not, you can update manually by navigating to Dashboard → Updates.</p>
</div>
</article>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&amp;linkname=WordPress%204.2.1%20released%20new%20patch" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fwordpress-4-2-1-released-new-patch%2F&#038;title=WordPress%204.2.1%20released%20new%20patch" data-a2a-url="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/" data-a2a-title="WordPress 4.2.1 released new patch"></a></p><p>The post <a href="https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/">WordPress 4.2.1 released new patch</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/wordpress-4-2-1-released-new-patch/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Vulnerability in popular WordPress themes</title>
		<link>https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/</link>
					<comments>https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 27 Dec 2014 21:37:37 +0000</pubDate>
				<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Critical Vulnerability in WP themes]]></category>
		<guid isPermaLink="false">http://www.cvtfradio.net/?p=2029</guid>

					<description><![CDATA[<p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin | 04 September 14. Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that's used by a large number of themes, researchers from  [...]</p>
<p>The post <a href="https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hackers exploit critical vulnerability in popular WordPress theme component WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said By Lucian Constantin | 04 September 14.</p>
<p>Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that&#8217;s used by a large number of themes, researchers from two security companies warned Wednesday.</p>
<p>The vulnerability affects versions 4.1.4 and older of Slider Revolution, a commercial WordPress plug-in for creating mobile-friendly content display sliders. The flaw was fixed in Slider Revolution 4.2 released in February, but some themes &#8212; collections of files or templates that determine the overall look of a site &#8212; still bundle insecure versions of the plug-in.</p>
<p>The vulnerability can be exploited to execute a local file inclusion (LFI) attack that gives hackers access to a WordPress site&#8217;s wp-config.php file, researchers from Web security firm Sucuri said in a blog post. This sensitive file contains database access credentials that can be used to compromise the whole site, the researchers said.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&amp;linkname=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fcritical-vulnerability-popular-wordpress-themes%2F&#038;title=Critical%20Vulnerability%20in%20popular%20WordPress%20themes" data-a2a-url="https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/" data-a2a-title="Critical Vulnerability in popular WordPress themes"></a></p><p>The post <a href="https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/">Critical Vulnerability in popular WordPress themes</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/critical-vulnerability-popular-wordpress-themes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web Security Issues</title>
		<link>https://cvtfstudios.net/web-security-issues/</link>
					<comments>https://cvtfstudios.net/web-security-issues/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:49:57 +0000</pubDate>
				<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<category><![CDATA[Web Security Issues]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1801</guid>

					<description><![CDATA[<p>A serious vulnerability in the WP eCommerce Plugin was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version. Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost  [...]</p>
<p>The post <a href="https://cvtfstudios.net/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p id="yui_3_16_0_1_1416864681517_48384">A serious vulnerability in the <a class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=0ptQiJ6leDcIw2mMKUw6kg" target="_blank" rel="nofollow">WP eCommerce Plugin</a> was announced within the last 24 hours (321st Oct 2014) . A fix has been released and some hosting companies are already auto-upgrading customers to the newest version.</p>
<p id="yui_3_16_0_1_1416864681517_48387">Upgrade to 3.8.14.4 of WP eCommerce immediately if you use this plugin. Please spread the word because with almost 3 million downloads this is a very popular plugin.</p>
<p id="yui_3_16_0_1_1416864681517_48390"><strong id="yui_3_16_0_1_1416864681517_48389"><a id="yui_3_16_0_1_1416864681517_48388" class="yiv4485711366valid-link yiv4485711366validation-enabled yiv4485711366validating" href="https://clicks.aweber.com/y/ct/?l=FLnrU&amp;m=3kDg7Km37O6aApy&amp;b=lF4QGQud_ZQEoo5ZAytSMA" target="_blank" rel="nofollow">Details on our blog&#8230;</a></strong></p>
<p id="yui_3_16_0_1_1416864681517_48391"><strong>​</strong></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&amp;linkname=Web%20Security%20Issues" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fweb-security-issues%2F&#038;title=Web%20Security%20Issues" data-a2a-url="https://cvtfstudios.net/web-security-issues/" data-a2a-title="Web Security Issues"></a></p><p>The post <a href="https://cvtfstudios.net/web-security-issues/">Web Security Issues</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/web-security-issues/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
