Cookie vulnerability on WordPress.com

If you have a blog that runs with WordPress and hosted on Worrdpress.com, you should be very careful when entering your management panel on your website. What do we mean? When connecting to Worrdpress, do not use public Wi-Fi, because you can deliver your information to a malicious user. Your account can be hacked, even if you have enabled two-factor authentication.

hacked wordpress

Yan Zhu, a security researcher at the Electronic Frontier Foundation (EFF), observed that blogs hosted on WordPress.com send user ID in plain text and not encrypted. Thus, even a Script Kiddie can steal login information.

When WordPress users log into their account, the of WordPress.com distributes a cookie named “wordpress_logged_in” to the user's browser, as reported by Yan Zhu on her blog. The researcher has noticed that this authentication cookie is being sent through HTTP in a very insecure way.

[tweet_embed id = 471186304667881472]

A malicious user can easily grab HTTP cookies if they are using the same Wi-Fi network, using some specialized tools, such as Firesheep, a network sniffing tool. The cookie can be added to any other web browser and will give the hacker illegal in the victim's WordPress account.

The good news is that if you have a WordPress website hosted on that supports HTTPS, then your blog is not vulnerable to the cookie reuse flaw.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).