A vulnerability in the REST API plug-in in WordPress versions 4.7 and 4.7.1
"This vulnerability has resulted in a kind of feeding frenzy where attackers are competing with each other to deface vulnerable WordPress websites. During the past 48 hours we have seen over 800,000 attacks exploiting this specific vulnerability across the WordPress sites we monitor."
Mark Maunder, Wordfence Founder and CEO
A short but important notice for any of our clients who are managing their site with WordPress.
A brief history for those who are not aware of the recent security breaches; On the 26th of January WordPress Version 4.7.2 was released. The update included security patches which at the time of the release the importance of these updates were not disclosed to the public.
6 days after the initial release, the details of the security update were publicly disclosed. In WordPress versions 4.7 and 4.7.1 a vulnerability in the REST API plug-in (enabled by default) would allow an unauthenticated user to modify the content of any post or page within a WordPress site.
Since the vulnerability was public acknowledgement, thousands of WordPress sites have been targeted and defaced by hackers.
We highly recommend any of our clients using vulnerable WordPress versions to update as soon as possible and as a further security measure, install a site security software such as Wordfence.