Get Expert Website Hosting

Choose website reliability and expertise with SiteGround!

Hosting Insights Product Updates Security WordPress

WPtouch Security Vulnerability Fixed on SiteGround Servers

Summarize this article with:
Jul 15, 2014

WPtouch vulnerability fixed

A serious vulnerability in one of the most popular WordPress plugins – WPtouch was announced yesterday. The exploit allows registered users to upload malicious PHP files to your website and use them to gain further access to it.

The plugin that creates a mobile-friendly version of your website is widely used so our security team immediately took action to prevent our users from getting hacked through this exploit. We’ve acted in a manner that has been proven successful in the recent JetPack and TimThumb vulnerabilities – we used our application layer firewall to filter out all requests to our servers that try to utilize the exploit.

Although, our customers are shielded against this vulnerability at a server level, we strongly recommend that you update your WPtouch plugin to its latest version where the security issue is properly fixed by the plugin developers.

Share this article

Hristo Pandjarov

Product Innovation Director

Enthusiastic about all Open Source applications you can think of, but mostly about WordPress. Add a pinch of love for web design, new technologies, search engine optimisation and you are pretty much there!

More by Hristo

Related Posts

Introducing Coderick AI: Build Apps and Websites Without Writing a Single Line of Code

Whether you're a business owner who's been putting off that internal tool because "it's too technical…

  • Dec 18, 2025
  • 3 min read

Meet SiteGround AI Studio: your AI workspace for business success

For over twenty years, we’ve stayed ahead of every major shift on the web, so you…

  • Dec 05, 2025
  • 6 min read

The Pros and Cons of AI Bot Crawling & How SiteGround Helps

AI technology has been developing for decades, but it was only within the past few years…

  • Aug 28, 2025
  • 4 min read

Comments ( 0 )

Leave a comment