Vulnerability Details: Remote Code Execution (RCE) in WordPress to Jekyll Exporter (Jekyll Exporter)
A frequent problem when it comes to security is that people assume that other people won’t do things that are a bad idea. An example of that involves a remote code execution vulnerability that was in the plugin WordPress to Jekyll Exporter (Jekyll Exporter). In data from the website AbuseIPDB there have recent reported probing for a file from that plugin:
...
This post provides insights on a vulnerability in the WordPress plugin Jekyll Exporter not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.
Plugin Security Scorecard Grade for Jekyll Exporter
Checked on July 26, 2024A