Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Author Delicious Brains

    (@deliciousbrains)

    Hi @niwin,

    As mentioned in the article you linked to, the vulnerability was addressed in Better Search Replace v1.4.5, released last week.

    Please update to BSR v1.4.5.

    –IJ

    Thread Starter Sinkadus

    (@niwin)

    Ah my bad – good work!

    scarpaweb

    (@scarpaweb)

    According to the article, the response was to update to the latest version.
    I am trying to update the plugin, but I am getting the following message:

    Update failed: <!DOCTYPE html> Error body { width: 35em; margin: 0 auto; font-family: Tahoma, Verdana, Arial, sans-serif; } An error occurred. Sorry, the page you are looking for is currently unavailable. Please try again later. If you are the system administrator of this resource then you should check the error log for details. We have articles on troubleshooting issues like high CPU usage and large memory usage on our official blog site. Faithfully yours, OpenResty.

    Please disregard as I was able to update to V 1.45

    • This reply was modified 10 months ago by scarpaweb.
Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘Hackers target WordPress database plugin active on 1 million sites’ is closed to new replies.