Academic literature on the topic 'WordPress content injection vulnerability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WordPress content injection vulnerability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WordPress content injection vulnerability"

1

Md, Maruf Hassan, Kaushik Sarker, Saikat Biswas, and Hasan Sharif Md. "Detection of Wordpress Content Injection Vulnerability." International Journal on Cybernetics & Informatics 6, no. 5 (2017): 1–15. http://dx.doi.org/10.5121/ijci.2017.6501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yudistiawan, Ari Dimas, and Nuril Anwar. "Website Application Security Value Analysis Using Crawling Method Against SQL Injection Attacks." Mobile and Forensics 6, no. 1 (2024): 39–50. http://dx.doi.org/10.12928/mf.v6i1.8198.

Full text
Abstract:
This study focuses on analyzing security vulnerabilities in the Codelatte website, specifically targeting SQL Injection attacks. While the implementation of HTTPS has enhanced user communication and server security, outdated pages lacking WordPress security features remain vulnerable to SQL Injection. The research employs a crawling method to assess security gaps, starting with URL processing, data crawling, and interaction with the web server, followed by output generation in the form of an HTML file. The collected data is used for vulnerability testing via the Acunetix web vulnerability scanner, as well as manual testing and Sqlmap penetration testing. Findings reveal security weaknesses categorized into informational, low, medium, and high risk levels. Through crawling, the study identifies vulnerabilities and reduces them to informational, low, and medium levels, highlighting the importance of regularly updating website security. The final report provides recommendations for enhancing the Codelatte website's security to prevent unauthorized database access.
APA, Harvard, Vancouver, ISO, and other styles
3

Petkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.

Full text
Abstract:
This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabilities of the selected platforms and such specific ones.
APA, Harvard, Vancouver, ISO, and other styles
4

Putra, Bagus Setya, and Dwi Budi Santoso. "Analisis Keamanan Website Berbasis WordPress melalui Penetration Testing untuk Meningkatkan Keamanan Digital." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 981–90. https://doi.org/10.35870/jtik.v9i3.3692.

Full text
Abstract:
The development of information technology has made the security and integrity of digital information exchange on websites extremely important. Many websites utilize Content Management Systems CMS like WordPress as an alternative choice. This research aims to conduct penetration testing on the WordPress based website teknoblog.top using the Penetration Testing Execution Standard PTES method and provide recommendations for improving existing vulnerabilities. The analysis results on teknoblog.top using the WPScan tool found 6 informational findings, which do not indicate vulnerabilities. Meanwhile, OWASP ZAP identified vulnerabilities with a total of 3 medium level alerts, 5 low level alerts, and 6 informational alerts. The vulnerability successfully exploited in this research was the Missing Anti Clickjacking Header with a medium level severity. This finding was confirmed using the BurpSuite Scanner tool. The vulnerability was caused by the website not properly configuring the security header. To verify the accuracy of the Missing Anti Clickjacking Header vulnerability findings on the OWASP ZAP scanning tool, exploitation was carried out manually using a simple HTML script and through the clickjacker.io website. It is important to address this issue to prevent web pages from being loaded in iframes on other websites. The recommended fix for this vulnerability is the addition of the X Frame Options header to protect the website from clickjacking attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

A. Karunamurthy, Dr. "SECURE AND SCALABLE WORDPRES DEPLOYMENT ON AWS WITH RDS." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04077.

Full text
Abstract:
Abstract This paper digital landscape, ensuring high availability, scalability, and security for web applications is crucial. This project focuses on deploying a secure and scalable WordPress website on Amazon Web Services (AWS) using industry best practices. By leveraging AWS services such as EC2, Auto Scaling, RDS, S3, VPC, IAM, and Security Groups, this deployment achieves high performance, reliability, and security. The architecture includes Amazon EC2 instances running WordPress in an Auto Scaling Group, ensuring seamless horizontal scalability. Amazon RDS is used for the MySQL database, providing managed, high-performance, and fault-tolerant data storage. Amazon S3 is integrated for media storage, reducing server load and improving content delivery. A Virtual Private Cloud (VPC) is configured to establish a secure and isolated network environment. IAM roles and policies enforce strict access control, while Security Groups protect against unauthorized access. To enhance security, HTTPS is enabled using an SSL certificate, and AWS WAF (Web Application Firewall) is employed to mitigate threats such as SQL injection and DDoS attacks. Automated backups and monitoring solutions like CloudWatch and AWS Backup ensure data integrity and real-time performance tracking. This project demonstrates a robust WordPress hosting solution that dynamically scales to handle traffic spikes while maintaining strong security standards. It serves as an ideal model for businesses seeking a cloud-based, resilient WordPress deployment on Aws. Key words: WordPress hosting, Amazon Web Services (AWS), EC2, Auto Scaling, RDS, S3, VPC, IAM, Security Groups, HTTPS, SSL certificate, AWS WAF, DDoS protection, SQL injection mitigation, CloudWatch, AWS Backup, high availability, scalability, cloud security, performance monitoring, managed database, media offloading, resilient architecture, and secure cloud deployment.
APA, Harvard, Vancouver, ISO, and other styles
6

Susanto, Budi. "PEMBENAHAN WEB PROFIL SINODE GEREJA KRISTEN JAWA." SHARE "SHaring - Action - REflection" 6, no. 2 (2020): 93–98. http://dx.doi.org/10.9744/share.6.2.93-98.

Full text
Abstract:
The GKJ Synod Web had undergone several modifications independently. It led to a vulnerability condition that cost system breaches. Building the web application independently in limited security resource was the main problem for GKJ Synod. In order to resolve the problem, the GKJ Synod collaborated with FTI UKDW. Wordpress was implemented to restore the the GKJ Synod web. The restoration process, requirement and content analysis, and information architecture design. Based on the information architecture design, the website had been setup and then the team empowered the Data and Multimedia Information Service Center of GKJ Synod to maintain the web application and the contents. The installed WordPress utilised the VPS service with an additional SSL security protocol that provides development support and security. Thie web application project will continue to the next stage which is online document management services.
APA, Harvard, Vancouver, ISO, and other styles
7

Buchyk, Serhii, and Andrii Kuroiedov. "JAVASCRIPT-BASED WEB EXPLOIT ANALYSIS MODEL." Information systems and technologies security, no. 2 (8) (2024): 17–25. https://doi.org/10.17721/ists.2024.8.17-25.

Full text
Abstract:
B a c k g r o u n d . The task of ensuring the security of web applications and servers remains important and relevant in the face of the ever-increasing number of attacks in cyberspace. The use of various open-source content management systems (e.g. WordPress, Joomla, Open Journal Systems, Drupal), which are quite popular for creating websites due to their ease of installation and use, unfortunately, require constant updating not only to improve the content but also to ensure the security of the system. In this article, the authors focus on the WordPress system, although this approach can be used for other systems as well. The article emphasises the importance of early detection of vulnerabilities to prevent potential cyber threats and their negative consequences. The article proposes a model and a script designed to speed up the detection of vulnerabilities in WordPress applications. Automation of the scanning process with a custom script allows you to quickly detect vulnerabilities, ensuring prompt fixes and updates. This approach not only strengthens security, but also helps preserve the reputation of websites and brands, which is critical in today's digital environment. M e t h o d s . The methods of analysing JavaScript-based web exploits were used, taking into account the general principles of their analysis and taking into account the methodologies for analysing web applications for vulnerabilities. R e s u l t s . An improved model of analysing a web application on CMS Wordpress based on a script that provides automated scanning of a web application by running the following utilities is presented: NMAP, Dirb, Nikto, SQLMap, WPScan and PwnXSS. All the results are recorded in a separate file for further study of all the found security issues of the web application. C o n c l u s i o n s . The developed model and script should help developers and testers speed up the process of identifying vulnerabilities in Wordpress, as they can run one script and get a voluminous and meaningful report with the identified vulnerabilities in a short time. This optimises vulnerability detection by automating the launch of scanners.
APA, Harvard, Vancouver, ISO, and other styles
8

Rohit, Kumar*. "DEVELOPING A SECURE WORDPRESS WEBSITE AND HOSTING ON NIC PLATFORM." wordpress, hack, security threat, website 5, no. 8 (2016): 1027–38. https://doi.org/10.5281/zenodo.60877.

Full text
Abstract:
Now-a-days most people explores the web at the end of the when a majority of business are closed and the reason being that websites are always there.  A website allows us to do business for 24 hours a day, 7 days a week, 365 days a year. If your competitor has a website then they will have a definite advantage to influence your business or even if you have an informative website then also it will help you to make your stakeholders aware about the progress of your organization. Moreover with powerful search engines it is easier to locate your organization online. A professional website improves your public image and your customers/stakeholders will have more confidence in your organization. Most small businesses are only able to market to their town and surrounding communities. With a website, you can take your products and services globally.  With the edges of having a website it is required to develop a website but to develop a website it is an obvious thought that the knowledge of HTML, CSS, PHP, MYSQL, etc. is a must. This is not a necessity to have absolute knowledge of above languages although it is advantageous if you possess that, the reason being the availability of several open source content management system in the public domain some of them are wordpress, joomla and drupal. The basic knowledge of above CMS will help you developing websites in minute or hours.[1][2] Now the other side of website development emphasizes the security constraint or the recovery after hack which is the common issues now-a-days with daily advancements in web technologies. Although there is a lot of online support for these abrupt issues but still a smart knowledge is required to deal with these issues to have a healthy website. In the proposed work, the limitation associated with the website are studied and removed. The complete method was presented that how the website got secured after vulnerability detection.
APA, Harvard, Vancouver, ISO, and other styles
9

J. Santhosh Kumar, B., and Kankanala Pujitha. "Web Application Vulnerability Detection Using Hybrid String Matching Algorithm." International Journal of Engineering & Technology 7, no. 3.6 (2018): 106. http://dx.doi.org/10.14419/ijet.v7i3.6.14950.

Full text
Abstract:
Application uses URL as contribution for Web Application Vulnerabilities recognition. if the length of URL is too long then it will consume more time to scan the URL (Ain Zubaidah et.al 2014).Existing system can notice the web pages but not overall web application. This application will test for URL of any length using String matching algorithm. To avoid XSS and CSRF and detect attacks that try to sidestep program upheld arrangements by white list and DOM sandboxing techniques (Elias Athanasopoulos et.al.2012). The web application incorporates a rundown of cryptographic hashes of legitimate (trusted) client side contents. In the event that there is a cryptographic hash for the content in the white list. On the off chance that the hash is discovered the content is viewed as trusted or not trusted. This application makes utilization of SHA-1 for making a message process. The web server stores reliable scripts inside div or span HTML components that are attribute as reliable. DOM sandboxing helps in identifying the script or code. Partitioning Program Symbols into Code and Non-code. This helps to identify any hidden code in trusted tag, which bypass web server. Scanning the website for detecting the injection locations and injecting the mischievous XSS assault vectors in such infusion focuses and check for these assaults in the helpless web application( Shashank Gupta et.al 2015).The proposed application improve the false negative rate.
APA, Harvard, Vancouver, ISO, and other styles
10

Rosner, Sabine, Sebastian Nöbauer, and Klara Voggeneder. "Ready for Screening: Fast Assessable Hydraulic and Anatomical Proxies for Vulnerability to Cavitation of Young Conifer Sapwood." Forests 12, no. 8 (2021): 1104. http://dx.doi.org/10.3390/f12081104.

Full text
Abstract:
Research Highlights: novel fast and easily assessable proxies for vulnerability to cavitation of conifer sapwood are proposed that allow reliable estimation at the species level. Background and Objectives: global warming calls for fast and easily applicable methods to measure hydraulic vulnerability in conifers since they are one of the most sensitive plant groups regarding drought stress. Classical methods to determine P12, P50 and P88, i.e., the water potentials resulting in 12, 50 and 88% conductivity loss, respectively, are labour intensive, prone to errors and/or restricted to special facilities. Vulnerability proxies were established based on empirical relationships between hydraulic traits, basic density and sapwood anatomy. Materials and Methods: reference values for hydraulic traits were obtained by means of the air injection method on six conifer species. Datasets for potential P50 proxies comprised relative water loss (RWL), basic density, saturated water content as well as anatomical traits such as double wall thickness, tracheid lumen diameter and wall/lumen ratio. Results: our novel proxy P25W, defined as 25% RWL induced by air injection, was the most reliable estimate for P50 (r = 0.95) and P88 (r = 0.96). Basic wood density (r = −0.92), tangential lumen diameters in earlywood (r = 0.88), wall/lumen ratios measured in the tangential direction (r = −0.86) and the number of radial cell files/mm circumference (CF/mm, r = −0.85) were also strongly related to P50. Moreover, CF/mm was a very good predictor for P12 (r = −0.93). Conclusions: the proxy P25W is regarded a strong phenotyping tool for screening conifer species for vulnerability to cavitation assuming that the relationship between RWL and conductivity loss is robust in conifer sapwood. We also see a high potential for the fast and easily applicable proxy CF/mm as a screening tool for drought sensitivity and for application in dendroecological studies that investigate forest dieback.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Conference papers on the topic "WordPress content injection vulnerability"

1

Ojagbule, Olajide, Hayden Wimmer, and Rami J. Haddad. "Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP." In SoutheastCon 2018. IEEE, 2018. http://dx.doi.org/10.1109/secon.2018.8479130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arromdoni, Bad'ul Hilmi, Mandahadi Kusuma, and Bambang Sugiantoro. "Web Application Vulnerability Analysis Using the OWASP Method (Case Study: OJS CSFD UIN Sunan Kalijaga Yogyakarta)." In The 6th International Conference on Science and Engineering. Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-fosz2d.

Full text
Abstract:
The Cyber Security and Digital Forensics (CSFD) Open Journal System (OJS) website owned by the information technology center and database (PTIPD) Islamic University Negri Sunan Kalijaga Yogyakarta is a software content management system (CMS) application that is intended as a media and means of research publications from academic research. Web-based applications that are not properly monitored will have the impact of being attacked by attackers. Vulnerability gaps that have been found by irresponsible attackers will have a very bad impact on the performance of the website application. From the summary of the results of the vulnerability scan, the researcher did not find high status vulnerability gaps using Aucentix tools, the researcher only found 18 vulnerability gaps at the medium risk level, 8 vulnerability gaps at low level and 10 informational vulnerability loopholes. As a comparison, the researchers conducted another scan using the OWAS-ZAP (Zed Attack Proxy) tool and found 17 vulnerabilities with details: 1 with high status, 4 with medium status, 8 with low status and 4 with informational status. The research is based on the OWASP Top-10 method as a measure and parameter in testing using penetration testing. researchers got 1 test result with successful status, namely Using Components with Known Vulnerabilities. Then the researcher found 1 type of vulnerability with posibility status, namely Sensitive Data Exposure with finding data that was not sensitive and 8 vulnerabilities that were not discovered, including: 1. Broken Authentication, 2. Cross-Site Scripting, 3. Security Misconfiguration, 4. Insufficient Logging and Monitoring, 5. Broken Access Control, 6. SQL Injection, 7. XML External Entities , 8. Insecure Deserialization.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Xiaoshuai, Xin Liao, Bo Ou, Yuling Liu, and Zheng Qin. "Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/673.

Full text
Abstract:
AI-generated content has accelerated the topic of media synthesis, particularly Deepfake, which can manipulate our portraits for positive or malicious purposes. Before releasing these threatening face images, one promising forensics solution is the injection of robust watermarks to track their own provenance. However, we argue that current watermarking models, originally devised for genuine images, may harm the deployed Deepfake detectors when directly applied to forged images, since the watermarks are prone to overlap with the forgery signals used for detection. To bridge this gap, we thus propose AdvMark, on behalf of proactive forensics, to exploit the adversarial vulnerability of passive detectors for good. Specifically, AdvMark serves as a plug-and-play procedure for fine-tuning any robust watermarking into adversarial watermarking, to enhance the forensic detectability of watermarked images; meanwhile, the watermarks can still be extracted for provenance tracking. Extensive experiments demonstrate the effectiveness of the proposed AdvMark, leveraging robust watermarking to fool Deepfake detectors, which can help improve the accuracy of downstream Deepfake detection without tuning the in-the-wild detectors. We believe this work will shed some light on the harmless proactive forensics against Deepfake.
APA, Harvard, Vancouver, ISO, and other styles
4

Saaibon, Mohamed Sopiee, Zainab Kayat, and Fatimah A Karim. "Management of Mercury Offshore for Onshore Production Facilities." In Offshore Technology Conference Asia. OTC, 2022. http://dx.doi.org/10.4043/31465-ms.

Full text
Abstract:
Abstract The objective of this paper is to provide an approach in mitigating the adverse effects of mercury found in production fields which include the evaluation on the requirement for mercury treatment facility and suitable technology and best location for the production fields and onshore LNG facilities. The evaluation included assessment of pipeline integrity and managing unexpected increase in mercury content to ensure Mercury Removal Unit (MRU) is capable to treat the gas within the design specification The method includes mercury mapping and analysis of the results. Evaluation of technology and type at various streams in gas, condensate and water streams. There is no method to predict mercury production forecast and sizing cannot be based on one exploration well data only. Subsurface data might not be representative due to improper procedure, sampling, preservation and timing. Rigorous technology evaluation was evaluated for various mercury species covering its vulnerability to operations abnormalities such as entrainment of moisture, spikes of mercury content, changes to feed gas, hydrogen sulfide content, historical experience of mercury contamination and its impact to operations and performance of cryogenic systems and chemical injection for pipelines. Review of effectiveness of mercury removal technology for gas stream cover metal sulfide based adsorbent and metal oxide based with H2S in-situ sulfiding. In view that there is no proven technology for condensates stream, particulates mercury removal using filtration and hydrocyclones of the multiphase condensate /water and water streams were considered Mercury has exceeded downstream design specification and pose threats to existing LNG facilities aluminum cryogenic heat exchanger. Speciation, particle size distribution and the use of a practical size test rig on site, adsorbent -condensate compatibility test are approaches to determine the capacity of the MRU. Based on the selected technology, concepts were derived for gas and condensate to ascertain the feasibility of mercury removal, particulate filtration, mercury impact to pipeline integrity and the basis for the onshore mercury removal facility. This yielded seven (7) different concepts or options addressing both MRU gas and condensate either at offshore platform or onshore facilities. The concept select ascertained the optimum requirement to install the mercury removal unit onshore upstream of an Acid Gas Removal Unit in the LNG facilities. A two-stage filtration to remove mercury particulates above 1 micron was selected for offshore facility. Understanding the behaviour of mercury and the distribution tendencies into the various streams and factors that influence this distribution would provide insight on the integrity of production and pipeline system and management of mercury for operations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography