Jetpack fixes essential info disclosure flaw present since 2016

WordPress plugin Jetpack launched a essential safety replace earlier in the present day, addressing a vulnerability that allowed a logged-in person to entry types submitted by different guests to the location.

Jetpack is a well-liked WordPress plugin by Automattic that gives instruments to boost web site performance, safety, and efficiency. In line with the seller, the plugin is put in on 27 million web sites.

The difficulty was found throughout an inside audit and impacts all Jetpack variations since 3.9.9, launched in 2016.

“During an internal security audit, we found a vulnerability with the Contact Form feature in Jetpack ever since version 3.9.9, released in 2016,” reads the safety bulletin.

“This vulnerability could be used by any logged in users on a site to read forms submitted by visitors on the site.”

Automattic has launched fixes for 101 impacted variations of Jetpack, all listed under:


13.9.1, 13.8.2, 13.7.1, 13.6.1, 13.5.1, 13.4.4, 13.3.2, 13.2.3, 13.1.4, 13.0.1, 12.9.4, 12.8.2, 12.7.2, 12.6.3, 12.5.1, 12.4.1, 12.3.1, 12.2.2, 12.1.2, 12.0.2, 11.9.3, 11.8.6, 11.7.3, 11.6.2, 11.5.3, 11.4.2, 11.3.4, 11.2.2, 11.1.4, 11.0.2, 10.9.3, 10.8.2, 10.7.2, 10.6.2, 10.5.3, 10.4.2, 10.3.2, 10.2.3, 10.1.2, 10.0.2, 9.9.3, 9.8.3, 9.7.3, 9.6.4, 9.5.5, 9.4.4, 9.3.5, 9.2.4, 9.1.3, 9.0.5, 8.9.4, 8.8.5, 8.7.4, 8.6.4, 8.5.3, 8.4.5, 8.3.3, 8.2.6, 8.1.4, 8.0.3, 7.9.4, 7.8.4, 7.7.6, 7.6.4, 7.5.7, 7.4.5, 7.3.5, 7.2.5, 7.1.5, 7.0.5, 6.9.4, 6.8.5, 6.7.4, 6.6.5, 6.5.4, 6.4.6, 6.3.7, 6.2.5, 6.1.5, 6.0.4, 5.9.4, 5.8.4, 5.7.5, 5.6.5, 5.5.5, 5.4.4, 5.3.4, 5.2.5, 5.1.4, 5.0.3, 4.9.3, 4.8.5, 4.7.4, 4.6.3, 4.5.3, 4.4.5, 4.3.5, 4.2.5, 4.1.4, 4.0.7, 3.9.10

Web site house owners and admins who depend on Jetpack must test if their plugin has routinely upgraded to one of many variations listed above and carry out a guide improve if it hasn’t.

Jetpack says there isn’t a proof that malicious actors exploited the flaw in its eight years of existence, nevertheless it advises customers to improve to a patched launch as quickly as potential.

“We have no evidence that this vulnerability has been exploited in the wild. However, now that the update has been released, it is possible that someone will try to take advantage of this vulnerability,”  warned Jetpack.

Be aware that there aren’t any mitigations or workarounds for this flaw, so making use of the obtainable updates is the one obtainable and really useful resolution.

Technical particulars in regards to the flaw and the way it may be exploited have been withheld for now to permit customers a while to use the safety updates.

Recent articles

Excessive-Severity Flaw in PostgreSQL Permits Hackers to Exploit Surroundings Variables

Nov 15, 2024Ravie LakshmananVulnerability / Database Safety Cybersecurity researchers have...

CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Assault Confirmed

Nov 15, 2024Ravie LakshmananCommunity Safety / Vulnerability The U.S. Cybersecurity...