Plugin AMP for WP fixed critical vulnerability

a minute read

The developers of the popular AMP plugin for WordPress – AMP for WP – have released a patch for a critical vulnerability discovered last month.

While the work was underway to eliminate the vulnerability, the plugin was removed from the corresponding section on WordPress.org. Last week, he was returned to the “system”.

According to the developers, the reason for the temporary withdrawal of the plug-in was a vulnerability that could be exploited by people who are not site administrators.

This means that hackers could manipulate plugin settings in order to place ads, add custom HTML or malicious JavaScript scripts.

WordPress users who have installed this plugin are advised to download the patch and apply it.

If automatic updates are enabled in the plugin settings, then the patch may have already been applied. Otherwise, the plugin will need to be updated manually.

Recall that earlier this month a serious vulnerability was discovered in the WP GDPR Compliance plugin.

Facebook Twitter LinkedIn Telegram Pocket

Related Posts:

A vulnerability such as XSS (cross-site scripting) has been discovered in the popular WordPress All-in-One SEO Pack plugin . This is reported on the website of the WPScan Vulnerability Database. Cross-site scripting (XSS) is a type of software vulnerability th...
A serious vulnerability was discovered in the popular WordPress WP Google Maps plugin , allowing hackers to take control of the site. This is reported on the WPScan Vulnerability Database page . At the moment, this vulnerability is already closed, and therefor...
In the popular plugin WP GDPR Compliance , a serious vulnerability was discovered. To secure the site, you need to upgrade to version 1.4.3 or higher. Currently, hackers are actively attacking WP-sites with this plugin. All resources with an earlier version th...