More Than 820,000 Sites Still Affected By SEO Plugin Flaw

December 22, 2021

Although a security update has been released since December 7, 2021 to fix two SEO WordPress plugins, recent revelations from download statistics showed that more than 820,000 websites using the plugin have not yet installed the update.

The two bugs in question, a critical Authenticated Privilege Escalation bug (CVE-2021-25036) and a high severity Authenticated SQL Injection (CVE-2021-25037) are considered very dangerous.

With the flaws, attackers only need low-level permissions such as Subscriber (a default WordPress user role that allows registered users to comment on articles published on WordPress sites).

As subscribers, attackers can exploit CVE-2021-25036 to elevate their privileges. After this, they gain remote code execution on vulnerable websites and take over completely.

In order to prevent such a takeover, WordPress admins using All in One SEO versions impacted by the flaw (4.0.0 to 4.1.5.2) and are yet to install the 4.1.5.3 patch are advised to do so immediately.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn