Get Expert Website Hosting

Choose website reliability and expertise with SiteGround!

Security Service Updates WordPress

WPtouch Security Vulnerability Fixed on SiteGround Servers

Jul 15, 2014 Hristo Pandjarov

WPtouch vulnerability fixed

A serious vulnerability in one of the most popular WordPress plugins – WPtouch was announced yesterday. The exploit allows registered users to upload malicious PHP files to your website and use them to gain further access to it.

The plugin that creates a mobile-friendly version of your website is widely used so our security team immediately took action to prevent our users from getting hacked through this exploit. We’ve acted in a manner that has been proven successful in the recent JetPack and TimThumb vulnerabilities – we used our application layer firewall to filter out all requests to our servers that try to utilize the exploit.

Although, our customers are shielded against this vulnerability at a server level, we strongly recommend that you update your WPtouch plugin to its latest version where the security issue is properly fixed by the plugin developers.

Share this article

Hristo Pandjarov

Product Innovation Director

Enthusiastic about all Open Source applications you can think of, but mostly about WordPress. Add a pinch of love for web design, new technologies, search engine optimisation and you are pretty much there!

More by Hristo

Related Posts

Gemini AI: Now Included in All Google Workspace Plans Offered by SiteGround

Last year, we proudly announced our partnership with Google Workspace, bringing the ultimate collaboration and productivity…

  • Feb 14, 2025
  • 2 min read

The Complete WordPress Security Guide + the Best Fixes

WordPress powers over a whopping 40% of the web. That’s an awful lot of websites—and also…

  • Feb 12, 2025
  • 9 min read

PHP 8.4 Highlights: What is New, Features and Improvements Explained

Packed with powerful features and enhancements, the latest PHP 8.4 version promises to make coding more…

  • Jan 30, 2025
  • 8 min read

Comments ( 0 )

Leave a comment

Add comment