



We all know that WordPress site allows users to post comments via the WordPress commenting system, and if you have enabled the commenting system then your site is vulnerable to this Zero-Day Persistent Cross Site Scripting (XSS) attack.





Vulnerability allow an attacker to inject code into the HTML content received by administrators who maintain the website. Attacks work by embedding malicious code into the comments section that appear by default at the bottom of a WordPress blog or article post.





The vulnerability is trigger as critical because the successful exploitation of the vulnerability allows the attackers to change the passwords, add new administrators, or take just about any other action legitimate admins can perform.





This could be the worst situation for all the WordPress users because, there is no patch available for this zero-day XSS vulnerability and vulnerability affects the latest version of WordPress too.





How It Works ?





Video Demonstration - POC

What to Do now?

As there is no Patch available at the meantime of the vulnerability, so it is recommended to all the administrator to disable the commenting system. To disable the commenting system, just follow this -Dashboard, Settings/Discussion, select as restrictive options as possible.

Here is the another major security warning for all the WordPress users, that aThis is the newly discovered vulnerability that leave millions of the WordPress site under threat.Security researcher "" from the Finland-based security firm Klikki Oy , have discovered the Critical Zero-day vulnerability affecting WordPress’ comment mechanisms. Attack code has been released that targets one of the latest versions of WordPress, making it a zero-day exploit that could touch off a series of site hijackings throughout the Internet.The exploit works by posting some simple JavaScript code as a comment and then adding a massive amount of text—about 66,000 characters or more than 64 kilobytes worth. Once the comment is processed by someone logged in with WordPress administrator rights to the site, the malicious code will be executed with no outward indication that an attack is under way. By default, WordPress doesn't automatically publish comments to a post unless the user has already been approved by an administrator. Attackers can work around this limitation by posting a benign comment that gets approved. By default, subsequent comments from that person will be automatically approved and published to the same post.