• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
wordpress releases update 6.4.2 to address critical remote attack vulnerability

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

You are here: Home / General Cyber Security News / WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
December 8, 2023

WordPress has produced model 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with a further bug to execute arbitrary PHP code on vulnerable sites.

“A distant code execution vulnerability that is not immediately exploitable in main nonetheless, the security group feels that there is a probable for superior severity when combined with some plugins, specifically in multisite installations,” WordPress mentioned.

According to WordPress security corporation Wordfence, the issue is rooted in the WP_HTML_Token course that was introduced in variation 6.4 to enhance HTML parsing in the block editor.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

A risk actor with the potential to exploit a PHP object injection vulnerability existing in any other plugin or theme to chain the two issues to execute arbitrary code and seize control of the specific web page.

“If a POP [property-oriented programming] chain is existing via an extra plugin or theme installed on the concentrate on technique, it could allow for the attacker to delete arbitrary files, retrieve delicate facts, or execute code,” Wordfence observed previously in September 2023.

WordPress

In a comparable advisory launched by Patchstack, the organization said an exploitation chain has been manufactured out there on GitHub as of November 17 and additional to the PHP Generic Gadget Chains (PHPGGC) task. It really is suggested that users manually look at their web pages to guarantee that it can be up-to-date to the most current edition.

“If you are a developer and any of your tasks comprise functionality calls to the unserialize functionality, we highly endorse you swap this with anything else, such as JSON encoding/decoding using the json_encode and json_decode PHP capabilities,” Patchstack CTO Dave Jong stated.

Identified this report exciting? Follow us on Twitter  and LinkedIn to go through additional exclusive content we write-up.


Some parts of this post are sourced from:
thehackernews.com

Previous Post: «founder of bitzlato cryptocurrency exchange pleads guilty in money laundering scheme Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme
Next Post: Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software mac users beware: new trojan proxy malware spreading via pirated software»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.