{"id":3530,"date":"2017-06-05T11:33:05","date_gmt":"2017-06-05T17:33:05","guid":{"rendered":"https:\/\/www.whitefirdesign.com\/blog\/?p=3530"},"modified":"2017-06-05T11:33:05","modified_gmt":"2017-06-05T17:33:05","slug":"sitelock-still-spreading-false-information-about-the-security-of-wordpress-to-their-customers","status":"publish","type":"post","link":"https:\/\/www.whitefirdesign.com\/blog\/2017\/06\/05\/sitelock-still-spreading-false-information-about-the-security-of-wordpress-to-their-customers\/","title":{"rendered":"SiteLock Still Spreading False Information About the Security of WordPress to Their Customers"},"content":{"rendered":"<p>Back in September we wrote about how the web security company SiteLock had introduced a new feature that was supposed to warn about vulnerabilities on WordPress websites, but <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/09\/06\/sitelock-spreading-false-information-about-wordpress-security-to-their-customers-through-their-platform-scan-for-wordpress\/\">would falsely claim that websites running older WordPress versions had vulnerabilities in them that they didn&#8217;t<\/a>.<\/p>\n<p>This seemed to be caused in part by a fundamental lack of understanding of how WordPress handles security, which involves security fixes being released for older version of WordPress that have the <a href=\"https:\/\/codex.wordpress.org\/Configuring_Automatic_Background_Updates\">automatic background updates feature<\/a>\u00a0(WordPress 3.7 and above). This is something that anyone dealing with hacked WordPress websites should know since part of properly cleaning them involves determining, to the extent possible, how they were hacked and you would need to know what vulnerabilities would exist in a version of WordPress when cleaning it. From everything we have seen <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2017\/05\/17\/why-sitelocks-poor-cleanups-lead-to-website-reinfections\/\">SiteLock doesn&#8217;t properly clean up hacked websites<\/a>\u00a0(and they\u00a0<a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/12\/06\/sitelock-uses-the-fact-that-they-cut-corners-with-their-hack-cleanups-to-try-to-upsell-customers\/\">even use that fact as a reason to upsell their customers<\/a>), so maybe it shouldn&#8217;t be surprising they wouldn&#8217;t know this.<\/p>\n<p>It also seems to be caused in part by them not understanding the underlying data source for the vulnerability information, the WPScan Vulnerability Database, as that correctly labels which versions of WordPress are vulnerable to the vulnerabilities (as we will show in a bit).<\/p>\n<p>We know that SiteLock is aware of all of this as they clearly read our post as they\u00a0<a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/09\/19\/sitelock-filed-a-dmca-takedown-notice-against-our-website-for-a-screenshot-of-their-homepage\/\">filed a DMCA takedown notice to remove an image we had included in the post<\/a>.<\/p>\n<p>You would think that after becoming aware of this\u00a0SiteLock would have fixed this, right? Well it turns out 9 months later they are still falsely claiming that WordPress website contain vulnerabilities they don&#8217;t.<\/p>\n<p>The other day someone contacted us after they had been told by their web host iPage that they their website had security issues and they should sign up for SiteLock. After doing that they contacted us after seeing our previous post about this issue and thinking that what SiteLock had told them about vulnerabilities on their website wasn&#8217;t true.<\/p>\n<p>The website was running WordPress 4.6.6 at the time and SiteLock claimed it had the following medium and high severity vulnerabilities:<\/p>\n<blockquote>\n<div><\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13696\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13697\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13698\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13699\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13700\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13701\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13702\">Category: <\/strong>csrf<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13703\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13704\">Summary: <\/strong>WordPress 4.2-4.7.2 &#8211; Press This CSRF DoS<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13705\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13706\">Description: <\/strong>CSRF DoS vulnerability in WordPress versions 4.2 to 4.7.2 through the Press This functionality.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13707\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13708\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13709\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13710\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13711\">Severity: <\/strong>Medium<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13712\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13713\">Category: <\/strong>rce<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13714\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13715\">Summary: <\/strong>WordPress 4.3-4.7 &#8211; Potential Remote Command Execution (RCE) in PHPMailer<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13716\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13717\">Description: <\/strong>Potential Remote Command Execution (RCE) in PHPMailer used in WordPress versions 4.3 to 4.7.1 can potentially be used to remotely execute commands.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13718\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13719\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13720\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13721\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13722\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13723\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13724\">Category: <\/strong>bypass<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13725\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13726\">Summary: <\/strong>WordPress 4.2.0-4.7.1 &#8211; Press This UI Available to Unauthorised Users<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13727\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13728\">Description: <\/strong>Authentication bypass vulnerability in WordPress Press This versions 4.2.0 to 4.7.1 allows unauthorized users to access the UI.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13729\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13730\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13731\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13732\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13733\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13734\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13735\">Category: <\/strong>csrf<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13736\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13737\">Summary: <\/strong>WordPress 2.8-4.7 &#8211; Accessibility Mode Cross-Site Request Forgery (CSRF)<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13738\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13739\">Description: <\/strong>Cross-Site Request Forgery (CSRF) in WordPress versions 2.8 to 4.7 via Accessibility Mode allows unauthorized actions to be performed.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13740\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13741\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13742\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13743\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13744\">Severity: <\/strong>Medium<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13745\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13746\">Category: <\/strong>bypass<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13747\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13748\">Summary: <\/strong>WordPress 2.8.1-4.7.2 &#8211; Control Characters in Redirect URL Validation<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13749\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13750\">Description: <\/strong>Control Characters vulnerability in WordPress versions 2.8.1 to 4.7.2 through the Redirect URL Validation<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13751\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13752\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13753\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13754\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13755\">Severity: <\/strong>Medium<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13756\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13757\">Category: <\/strong>unknown<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13758\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13759\">Summary: <\/strong>WordPress 3.0-4.7 &#8211; Cryptographically Weak Pseudo-Random Number Generator (PRNG)<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13760\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13761\">Description: <\/strong>Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in WordPress versions 3.0 to 4.7 in the multisite activation key creates the potential to guess\/brute-force the activation key.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13762\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13763\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13764\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13765\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13766\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13767\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13768\">Category: <\/strong>xss<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13769\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13770\">Summary: <\/strong>WordPress 3.4-4.7 &#8211; Stored Cross-Site Scripting (XSS) via Theme Name fallback<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13771\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13772\">Description: <\/strong>Stored Cross-Site Scripting (XSS) WordPress versions 3.4 to 4.7 via Theme Name fallback allows malicious code to be stored on the site.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13773\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13774\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13775\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13776\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13777\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13778\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13779\">Category: <\/strong>xss<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13780\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13781\">Summary: <\/strong>WordPress 4.3.0-4.7.1 &#8211; Cross-Site Scripting (XSS) in posts list table<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13782\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13783\">Description: <\/strong>Cross-Site Scripting (XSS) vulnerability in WordPress versions 4.3 to 4.7.1 through the posts list table.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13784\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13785\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13786\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13787\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13788\">Severity: <\/strong>Medium<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13789\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13790\">Category: <\/strong>xss<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13791\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13792\">Summary: <\/strong>WordPress 2.9-4.7 &#8211; Authenticated Cross-Site scripting (XSS) in update-core.php<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13793\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13794\">Description: <\/strong>Authenticated Cross-Site scripting (XSS) WordPress versions 2.9 to 4.7 via update-core.php allows malicious code to be injected to the page.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13795\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13796\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13797\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13798\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13799\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13800\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13801\">Category: <\/strong>xss<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13802\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13803\">Summary: <\/strong>WordPress 4.0-4.7.2 &#8211; Authenticated Cross-Site Scripting (XSS) in YouTube URL Embeds<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13804\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13805\">Description: <\/strong>Authenticated Cross-Site Scripting (XSS) vulnerability in WordPress versions 4.0 to 4.7.2 allows an attacker to inject malicious code on to the site through YouTube URL Embeds.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13806\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13807\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13808\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13809\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13810\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13811\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13812\">Category: <\/strong>xss<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13813\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13814\">Summary: <\/strong>WordPress 3.6.0-4.7.2 &#8211; Authenticated Cross-Site Scripting (XSS) via Media File Metadata<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13815\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13816\">Description: <\/strong>Authenticated Cross-Site Scripting (XSS) vulnerability in WordPress versions 3.6.0 to 4.7.2 allows malicious code to be injected on to the site via Media File Metadata<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13817\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13818\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13819\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13820\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13821\">Severity: <\/strong>High<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13822\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13823\">Category: <\/strong>sqli<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13824\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13825\">Summary: <\/strong>WordPress 3.5-4.7.1 &#8211; WP_Query SQL Injection<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13826\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13827\">Description: <\/strong>In WordPress 3.5 to 4.7.1 WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data.<\/div>\n<\/div>\n<hr id=\"yiv3409560441yui_3_16_0_1_1496512603018_13828\" \/>\n<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13829\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13830\">\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13831\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13832\">Severity: <\/strong>Medium<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13833\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13834\">Category: <\/strong>unknown<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13835\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13836\">Summary: <\/strong>WordPress &lt;= 4.7 &#8211; Post via Email Checks mail.example.com by Default<\/div>\n<div id=\"yiv3409560441yui_3_16_0_1_1496512603018_13837\"><strong id=\"yiv3409560441yui_3_16_0_1_1496512603018_13838\">Description: <\/strong> Post via Email Checks mail.example.com by Default in WordPress version 4.7 and earlier.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div><\/div>\n<\/blockquote>\n<p>Those vulnerabilities don&#8217;t exist in WordPress 4.6.6, which can be seen by looking at the relevant entries in the WPScan Vulnerability Database. Let&#8217;s take a look at a couple of examples:<\/p>\n<p>For the vulnerability &#8220;<a href=\"https:\/\/wpvulndb.com\/vulnerabilities\/8721\">WordPress 3.0-4.7 &#8211; Cryptographically Weak Pseudo-Random Number Generator (PRNG)<\/a>&#8221; the vulnerability was fixed in version 4.6.2:<\/p>\n<p><a href=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3533\" src=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1.png\" alt=\"\" width=\"1450\" height=\"250\" srcset=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1.png 1450w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1-300x52.png 300w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1-768x132.png 768w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1-1024x177.png 1024w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-1-1200x207.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><\/p>\n<p>For the vulnerability &#8220;<a href=\"https:\/\/wpvulndb.com\/vulnerabilities\/8765\">WordPress 3.6.0-4.7.2 &#8211; Authenticated Cross-Site Scripting (XSS) via Media File Metadata<\/a>&#8221; you can see that it was fixed in version 4.6.4:<\/p>\n<p><a href=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3534\" src=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2.png\" alt=\"\" width=\"1450\" height=\"330\" srcset=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2.png 1450w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2-300x68.png 300w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2-768x175.png 768w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2-1024x233.png 1024w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2017\/06\/wpscan-vulnerability-database-entry-2-1200x273.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/a><\/p>\n<p>It also worth noting here that the severity ratings that SiteLock provides here look to be vastly overstated since none of these vulnerabilities is likely (or has in fact been) exploited on wide scale, which you would expect at least for vulnerabilities rated as being high severity.<\/p>\n<p>iPage isn&#8217;t innocent in this, as not only do <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/09\/09\/sitelock-hosting-partner-gets-majority-of-fees-for-sitelock-services\/\">they get a significant percentage of the price being paid for SiteLock services sold through their partnership<\/a>, but <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/09\/08\/one-of-sitelocks-owners-is-also-the-ceo-of-many-of-the-companys-web-hosting-partners\/\">their parent company also happens to be\u00a0run by SiteLock&#8217;s owners<\/a>.<\/p>\n<p>You would also think that WordPress might make a point of warning people away from SiteLock since they are profiting off falsely claiming that WordPress websites contain vulnerabilities, but instead they have welcomed them as sponsor and speaker at various WordCamps, WordPress conferences. In fact they <a href=\"https:\/\/central.wordcamp.org\/global-community-sponsors\/\">thanked them<\/a> for their &#8220;commitment to the WordPress community&#8221;:<\/p>\n<blockquote><p><span class=\"s1\">We\u2019d like to thank each of our 2017 global community sponsors for their commitment to the WordPress community. T<\/span><span class=\"s1\">heir generous contributions support community events like WordCamps and WordPress user groups worldwide.<\/span><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Back in September we wrote about how the web security company SiteLock had introduced a new feature that was supposed to warn about vulnerabilities on WordPress websites, but would falsely claim that websites running older WordPress versions had vulnerabilities in them that they didn&#8217;t. This seemed to be caused in part by a fundamental lack &hellip; <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2017\/06\/05\/sitelock-still-spreading-false-information-about-the-security-of-wordpress-to-their-customers\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;SiteLock Still Spreading False Information About the Security of WordPress to Their Customers&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[79,39,81,72],"class_list":["post-3530","post","type-post","status-publish","format-standard","hentry","category-bad-security","tag-ipage","tag-sitelock","tag-wordcamp","tag-wpscan-vulnerability-database"],"_links":{"self":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/3530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/comments?post=3530"}],"version-history":[{"count":5,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/3530\/revisions"}],"predecessor-version":[{"id":3537,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/3530\/revisions\/3537"}],"wp:attachment":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/media?parent=3530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/categories?post=3530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/tags?post=3530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}