By Marcos Colon

Found in the popular content management system’s REST API, if leveraged the bug allows online miscreants to modify the content of any post published via a WordPress site, according to a CSO Online report.

A patch was released on January 26, but the vulnerability was not immediately disclosed to the public by WordPress, leaving many users unaware of the update, resulting in a slew of attacks.

As of Monday, February 6, security firm Sucuri reported that attack campaigns have resulted in as many as 67,000 WordPress web pages being defaced. That number has since grown to 1.6  million pages found on roughly 40,000 websites, according to data from security firm Feedjit.

Webmasters are urged to apply the patch as soon as possible.