Alert, Upgrade To WordPress 2.1.2

Anchor Brewery Tour

The server hosting WordPress 2.1.1 was recently exploited and malicious code was added to the download file. Anyone who previously upgraded to WordPress 2.1.1 should upgrade to WordPress 2.1.2 immediately. Here’s more info.

This morning we received a note to our security mailing address about unusual and highly exploitable code in WordPress. The issue was investigated, and it appeared that the 2.1.1 download had been modified from its original code. We took the website down immediately to investigate what happened.

It was determined that a cracker had gained user-level access to one of the servers that powers wordpress.org, and had used that access to modify the download file. We have locked down that server for further forensics, but at this time it appears that the 2.1.1 download was the only thing touched by the attack. They modified two files in WP to include code that would allow for remote PHP execution.

photo by Scott Beale

Scott Beale
Scott Beale

Scott Beale is the founder of Laughing Squid and is based in New York City. When not running the blog, Scott can be found posting on Threads and sharing photos on Instagram.