Archive for WordPress

A Follow Up To My WordPress Posting Issues

Posted in Commentary with tags on November 11, 2025 by itnerd

Last night I posted a story about a problem posting stories which wasn’t just affecting me, but some other people as well. While I had a workaround, it wasn’t optimal. That changed this morning when I got an email from a WordPress “happiness engineer” who I assume is their term for a tech support person. This is the email that I got:

Hi there!
 
We’ve recently received a tweet via X (Twitter) referring to an issue with posting on your site – itnerd.blog. Thank you for reaching out. I wanted to follow up here to make sure that’s addressed correctly 🙂
 
There seems to be a conflict with the new editor version and the AMP plugin. You can deactivate it from Plugins → Installed Plugins.
Our belief is the AMP plugin is no longer needed in most use cases, and you can keep it deactivated. But if you have a specific reason to re-enable please let me know and I can look into other solutions for you.
 
If you have any additional questions, don’t hesitate to let me know, I’d be happy to help!

So, the TL:DR is what this “happiness engineer” suggested worked. But let’s go into the weeds. AMP stands for Accelerated Mobile Pages. Google came up with this a few years ago to make pages load faster on mobile devices.

AMP has two basic components:

  1. A way of writing small web-pages
  2. A way of caching/loading those small web-pages to make them quicker to load.

But it’s fallen out of favor because In order to use AMP, you also need to agree to allow anyone to “cache” the AMP versions of you web-pages. This means that they can take a copy of the page and direct people to that copy, rather than the original version on your web-site. Which is a #fail if you are trying increase traffic to your website. And some big social media sites don’t like AMP at all. Reddit for example gives you a warning if you use an AMP link in a Reddit post.

So the suggestion from WordPress that AMP isn’t needed anymore has some degree of validity. Which is why I disabled it on my site. But the thing is that WordPress clearly broke something when they updated the post editor. Hopefully they don’t press the “easy button” and make this default solution for this issue because there’s clearly a bug that they need to fix. Plus it was working up until 1PM EST yesterday which supports the fact that they broke something. So here’s hoping that they do the right thing that will help users and themselves in the long term.

WordPress Issue Leaves Customers Unable To Post

Posted in Commentary with tags on November 10, 2025 by itnerd

Now I host this blog via WordPresss.com because my logic is that they take care of all the security and updates so that I don’t have to. That is supposed to make my life easer. But since about 1PM EST today, I have been unable to post anything via their web interface. When I try to post something, I get this error:

That error is not exactly helpful. But this is a WordPress.com issue as this happens on multiple devices in multiple browsers.

So you’re likely wondering how I am getting this story online tonight. Well my workaround is to use the WordPress app on my iPhone. And then use iPhone Mirroring so that I can at least use a real keyboard and mouse. I thought it was a party trick by Apple when it first came out, but now it has proven to me a lifeline as it is allowing me to at least meet my “right now” commitments to get stories online. But this doesn’t change the fact that WordPress.com needs to address this and ASAP.

I posted on Twitter about this and got two responses from people who are affected by this issue. Thus I know that I am not alone. So I am going to call out WordPress.com directly. This has been going on since 1PM EST today. When are you going to foxy this? And since a lot of us pay for your services because we use WordPress to run businesses and the like, what are you going to make us whole on that front?

I don’t expect them to answer. I expect them to fix whatever is going on and pretend that id never happened. But I am free to be surprised.

Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin- Expert Perspectives

Posted in Commentary with tags on October 9, 2025 by itnerd

Threat actors are actively exploiting a critical authentication bypass vulnerability (CVE-2025-5947, CVSS 9.8) in the Service Finder WordPress theme and its bundled Service Finder Bookings plugin. The flaw allows unauthenticated attackers to gain access to any account, including administrators, by exploiting improper cookie validation in the account-switching function. Attackers can hijack sites to inject malicious code, redirect users, or host malware. The issue affects all versions up to 6.0 and was patched in version 6.1 on July 17, 2025. Exploitation has been observed since August 1, with over 13,800 attempts detected to date.

Gunter Ollmann, CTO, Cobalt:

     “The pure deja vu of another critical WordPress vulnerability cannot be ignored. Threat actors are increasingly automating the exploitation of common CMS plugins to gain persistent access to web infrastructure. Once inside, adversaries can pivot to distributing malware, stealing credentials, or using compromised sites in larger botnets. The WordPress ecosystem’s accessibility makes it a prime target, and with so many vulnerabilities like this over the years for WordPress, security teams should treat the service as untrusted and strengthen systems around it to protect critical data and connected systems.”

I’m a WordPress user so any report of a vulnerability in this platform concerns me. If you’re running a self hosted instance of WordPress, you might want to make sure that you’re fully up to date as soon as you can.

ShadowCaptcha compromises more than 100 WordPress sites

Posted in Commentary with tags , on August 26, 2025 by itnerd

A large-scale campaign dubbed ShadowCaptcha has compromised more than 100 WordPress sites worldwide, redirecting visitors to fake CAPTCHA pages that employ the ClickFix tactic to deliver information stealers, ransomware, and cryptocurrency miners. Impacted industries include technology, healthcare, finance, hospitality, and real estate, with sites in Australia, Brazil, Italy, Canada, Colombia, and Israel most affected. Researchers warn that ShadowCaptcha demonstrates how social engineering has evolved into full-spectrum cyber operations, blending credential theft, persistence, and ransomware monetization.

There’s a really good rundown on this campaign here: ShadowCaptcha Campaig Targets WordPress Sites with Malware

Gunter Ollmann, CTO, Cobalt had this comment:

 “ShadowCaptcha is a stark reminder that social engineering has matured into an industrialized cybercrime model. What begins with a simple CAPTCHA lure now escalates into credential theft, ransomware, or even crypto mining—all without exploiting a traditional software vulnerability. The use of LOLBins, obfuscation, and vulnerable drivers shows how attackers are increasingly weaponizing legitimate tools to maintain stealth and maximize profits. Defenders need to rethink their assumptions: hardening infrastructure alone is not enough, security strategies must also focus on disrupting attacker workflows and continuously validating user behavior to blunt the impact of these evolving campaigns.”

Since I host this blog via WordPress, this gets my attention. I do use MFA and I do updates as soon as they come out. Thus I believe that I am secure. But you have to wonder about the thousands of WordPress sites that are out there.

Fake WordPress Caching Plugin Used to Steal Admin Credentials

Posted in Commentary with tags on June 10, 2025 by itnerd

A sophisticated malware campaign targeting WordPress administrators has been discovered, utilizing a deceptive caching plugin to steal login credentials and compromise website security. 

Commenting on this is Martin Jartelius, CISO at Outpost24:

“Installing an unknown plugin is always a risk. Markers such as the ones mentioned are also not great to use—a somewhat more engaged attacker would simply fork an open-source project, backdoor that, and include the expected information. The description associated with this “attack” shows both a lack of creativity and enthusiasm with the attacker. The reason we mention this is not to encourage the attackers to try harder, it’s to ensure that administrators are aware that malicious plugins are a real threat, and that they should never expect them to show up with this low level of ambition. Hackers are generally better than this. Think twice, install once.”

I am a WordPress user and I try to stick to known plugins to avoid this scenario. But because it pays to be paranoid, I will be giving my WordPress instance a second look to make sure that I don’t have anything “evil” lurking that I should be concerned about.

WordPress Won’t Be Sharing Your Posts To Twitter Because Of Elon Musk’s API Price Hike

Posted in Commentary with tags , on May 1, 2023 by itnerd

Many people who are on the WordPress platform rely on being able to share their posts onto Twitter via functionality built into WordPress Jetpack. But those days are effectively over as WordPress no longer supports posting to Twitter and has pointed the finger at Elon Musk and his API price hike as the reason:

In early April, we experienced an unexpected suspension of our Twitter API access. This access is what powers Jetpack Social, which in turn helps you automatically share your blog posts to Twitter. Though the service was restored that same day, it turns out that there were bigger changes looming on the horizon. 

Twitter decided, on short notice, to dramatically change the terms and pricing of the Twitter API. We have attempted to work with Twitter in good faith to negotiate new terms, but we have not been able to reach an agreement. As a result, the Twitter connection on Jetpack Social will cease to work, and your blog posts will no longer be auto-shared to Twitter.

You will still be able to share your posts to Twitter manually by pasting the post link into the body of your tweet. 

Now I turned this functionality off when I more or less abandoned Twitter. But those who rely on this functionality for marketing purposes are going to be very unhappy campers. Though there is good news, if you want to call it that:

In addition, you can still auto-share your posts to Tumblr, Facebook, and Linkedin. In the near future, we are adding the ability to auto-share to Instagram and Mastodon. We are continuing to release new features in Jetpack Social, so keep an eye on the Jetpack blog for more updates.  

Now I have been auto posting to Mastodon (where you can find me at @The_IT_Nerd@noc.social by the way) since the start of the year via a third party plug in. But it will be nice to have native Jetpack functionality. That way people can move their followers from Twitter to Mastodon much easier. Seeing as Twitter is becoming an increasingly hostile place under Elon.

Securi Details WordPress Balada Injector Campaign

Posted in Commentary with tags on April 12, 2023 by itnerd

WordPress vulnerabilities have been in the news lately. Today I am discussing the Balada Injector campaign that has been attacking WordPress’s Elementor Pro plugin for the past six years. Here’s the details from Securi:

The vulnerability allows authenticated users to arbitrarily change wp_options values within the database via the AJAX action of Elementor Pro working in conjunction with WooCommerce.

Since WooCommerce websites allow registration for customer accounts, any website with user registration enabled with the Elementor Pro plugin and WooCommerce installed is liable to be exploited if using the vulnerable version.

The plugin uses the update_option function which is used by WordPress to change database values for website settings, such as allowing shop admins to change some options within their site database. However, this recent vulnerability results from user input not being validated properly and the function does not check whether only high-privileged users are using it.

When both the Elementor Pro and WooCommerce plugins are active (a rather common combination within WordPress websites) this can lead to arbitrary wp_options changes such as:

  • siteurl value
  • default user role
  • user registration

We have also observed multiple users reporting that their administrator user name was changed to ad@example.com after this vulnerability was exploited on their website, as well as new administrator users added using the pattern wpnew_*** within the database.

Now you might have noticed the word “WooCommerce” in the above statement. That’s because you might have heard about another WordPress vulnerability that leverages WooCommerce.

David Maynor, Senior Director of Threat Intelligence, Cybrary has a very detailed comment on this:

   “The most frustrating discussion a security person can have is the talk with sales/marketing where the need for WordPress is brought up. I am a long tome security researcher and I have the opinion that WordPress cannot be made secure.

   “WordPress dates back to 2003 with the goal of replacing the need for developers to make changes to a website.  Things like website themes, plugins that will do almost anything, adapting content to a number of browsers and platforms like mobile devices. WordPress has been institutionalized by pretty much everyone to be the de facto CMS.

   “Because of this overwhelming adoption for critical needs like customer facing web pages an entire developer ecosystem sprouted up around developing themes, tools, and plugins to make WordPress even easier to use. This is the equivalent of building a bad roof on a shaky foundation for a house in an earthquake zone. 

   “If you haven’t worked with sales and marketing departments before you might not be aware of the absolute dominance WordPress has in its market. There are entire tools and marketing platforms based on analyzing and optimizing WordPress content for data collection, targeted advertising, and customer insights.

   “Targeting a market for non-technical people to minimize technical needs leads WordPress users to often know nothing about a system other than the WordPress interface. WordPress is a popular bundled application for site hosting platforms to bundle in with a hosting subscription. The mixture of lack of technical knowledge or not being aware you may have WordPress on your hosted platform combines with PHP development and outdated security practices to make WordPress a perfect target for threat actors to steal data or use a compromised site to trick unsuspecting users into malicious interactions that look legitimate.

   “I say all this to address the questions of why WordPress is a rich target and why it keeps being the target if malicious campaigns. It is low hanging fruit that is trivial to pop. It’s so popular as a target it is often the target newbie hackers start with.

   “So now to Balada. Why is it so large? A mixture of low hanging fruit and exploitable targets that can often be found with Google dorking, and attackers using compromised hosts as currency leads to a long dwell time for attackers on a victim. 

   “This campaign is so large and lengthy due to the attackers taking advantage of many uses of WordPress like targeting specific platforms with specific code or easily hiding backdoors in pirated plugins. This group is the multi-headed hydra of attacks by varying exploits and post compromise activities.

   “In addition to tooling and techniques the rise of encryption everywhere blinds many network based detection tools with the same technology TLS used to make sure a hacker at a coffee shop isn’t sniffing a unsuspecting Wi-Fi users website credentials.

WordPress is a de facto content management solution with an entire ecosystem of developers writing themes, plugins and tools. Often this 3rd party software is the source of compromise.

   “This campaign is large because the attackers have multiple attacks and post compromise tooling that allows them to stay a few steps ahead of WordPress admins.

   “Website owners often go to WordPress because it allows quick and easy content development without the need for a team of coders. These are the users least likely to notice they have been comprised.

   “I don’t think WordPress and its ecosystem can be secured. Popular WordPress security apps often don’t try to stop intrusions but rather focus on cleaning out an attacker by rolling to a previously known good version. If the security experts don’t think they can stop attackers why would anyone else?”

This scares me as I use WordPress for this blog. I’ve spent a lot of time going through the configuration of this blog to assure that it is as secure as possible. Hopefully WordPress can step up and improve security with its product as that combined with individual WordPress users doing all they can to improve security on their end may be the only hope of mitigating these attacks.

It Appears Elon Musk Broke The Ability For WordPress Sites To Post To Twitter For 24 Hours

Posted in Commentary with tags , on April 5, 2023 by itnerd

As many of you know, I no longer post on Twitter because what a clown show that it has become. But when I did, I used functionality built within WordPress called the Jetpack Social tool to do it. Well, it’s a good thing that I don’t post on Twitter as apparently Elon broke support for the Jetpack Social tool on April 3:

On April 3, Twitter suspended WordPress.com’s access to the Twitter API without warning. As a result, Jetpack Social — the built-in tool that we use to auto-share your posts to social media — is currently broken for Twitter. This means that auto-posting to Twitter via WordPress.com is not actively working. 

Thankfully, this issue is isolated to Twitter, which means that Jetpack Social connections to other platforms are unaffected. Rest assured that you can continue sharing to Tumblr, Facebook, and LinkedIn without interruption.

But then the next day this happened:

The earlier reported outage has been resolved. Twitter is working again for Jetpack Social and all other functionalities that depend on Twitter. All Jetpack Social connections to Twitter, Tumblr, Facebook, and LinkedIn can be used as usual. 

We are working with Twitter directly to ensure this service keeps running without interruption.

You have to wonder if WordPress paid Elon to get functionality working again. We’ll never know for sure. But the fact is that if you rely on some piece of code to do something that is related to Twitter, it may break without warning. hat alone should make you reconsider your relationship with the platform. Especially if you’re a company or someone who is trying to promote themselves.

 730K WordPress Sites Force-Updated To Patch Critical Plugin Bug

Posted in Commentary with tags , on June 17, 2022 by itnerd

WordPress sites using Ninja Forms, a forms builder plugin with more than 1 million installations, have been force-updated en masse this week to a new build that addresses a critical security vulnerability likely exploited in the wild. The vulnerability is a code injection vulnerability affecting multiple Ninja Forms releases, starting with version 3.0 and up.

Wordfence threat analyst Ramuel Gall discovered when reverse-engineering the patch that unauthenticated attackers can exploit this bug remotely to call various Ninja forms classes using a flaw in the Merge Tags feature:

There is evidence to suggest that this vulnerability is being actively exploited in the wild, and as such we are alerting our users immediately to the presence of this vulnerability.

This flaw has been fully patched in versions 3.0.34.2, 3.1.10, 3.2.28, 3.3.21.4, 3.4.34.2, 3.5.8.4, and 3.6.11.WordPress appears to have performed a forced automatic update for this plugin, so your site may already be using one of the patched version. Nonetheless, we strongly recommend ensuring that your site has been updated to one of the patched versions as soon as possible since automatic updates are not always successful.

Christopher Prewitt, CTO MRK Technologies had this to say:

WordPress and WordPress plugins are always under attack. WordPress is the most popular CMS, powering over 43% of websites. Attackers are always looking to leverage their efforts, getting the most results as possible. 

While WordPress appears to have performed a forced automatic update for this plugin, it is always important to validate and ensure your site and plugins are configured to automatically update.

This is good advice for anyone who runs a WordPress site. Which would include yours truly. I run very few plugins for security reasons. But if you run a WordPress site that might not be your use case. Thus Mr. Prewitt’s advice is something that you should keep in mind.

Motto Becomes 2nd Agency In Canada To Be Named An Official Partner Of WordPress

Posted in Commentary with tags , on October 13, 2021 by itnerd

Motto, a web agency that specializes in developing custom sites, is proud to announce that it has become an official partner of WordPress VIP.  WordPress is the largest website-building software in the world. As one of only two partners of WordPress in Canada, the Montreal-based Motto is now positioned to better serve existing clients and expand its customer base.

WordPress currently powers more than 40% of all websites on the Internet. It is open source (free of software licensing) and is unique in terms of enterprise-level service and infrastructure.

Motto started over 20 years ago as a creative web agency building custom websites and web apps. In the past five years it has adapted WordPress software to become an expert in producing custom WordPress sites for clients that range from small and mid-size businesses (over $5 million) to large organizations. Motto also has an agency agreement with KINSTA, a web-hosting company with more than 20,000 customers.