Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WordPress RCE Vulnerability Fixed

December 8, 2023
Reading Time: 2 mins read
in Alerts
WordPress RCE Vulnerability Fixed

WordPress has issued version 6.4.2 to remedy a recently discovered remote code execution (RCE) vulnerability tied to a Property Oriented Programming (POP) chain flaw within WordPress core 6.4. This vulnerability, detected by the project’s security team, introduces the risk of arbitrary PHP code execution, especially when combined with certain plugins or themes. The critical aspect of this security concern lies in the need for an attacker to control all properties of a deserialized object, facilitated by PHP’s unserialize() function.

A consequence of this control is the potential to manipulate the application’s flow by influencing values sent to magic methods like ‘_wakeup()’. While the RCE vulnerability is not directly exploitable in the WordPress core, the security team highlights its potential severity when combined with specific plugins, particularly in multisite installations. The risk is contingent on the existence of a PHP object injection flaw on the target site, which might be present in a plugin or theme add-on. A PSA by WordPress security experts at Wordfence delves into technical details, pointing to the ‘WP_HTML_Token’ class introduced in WordPress 6.4 to enhance HTML parsing in the block editor as the source of the issue.

The class’s ‘__destruct’ magic method, utilizing ‘call_user_func’ to execute a function defined in the ‘on_destroy’ property, becomes exploitable in the context of an object injection vulnerability, allowing an attacker to gain control over properties and execute arbitrary code. While the severity of this vulnerability increases the overall risk for WordPress sites, its exploitation is not standalone. Object injection on installed and active plugins or themes is a prerequisite for a successful attack. Despite this, the security community emphasizes the importance of site administrators updating to the latest WordPress version (6.4.2) to mitigate potential risks. Although most updates are designed to install automatically, manual verification is recommended to ensure the completion of the update process. The urgency is underlined by the existence of an exploit chain for this issue, discovered on GitHub and later added to the PHPGGC library, which is widely used in PHP application security testing. In summary, while the RCE vulnerability is contingent on specific conditions, a proactive approach to updating remains crucial for securing WordPress sites.

Referral link

  • PSA Critical
Tags: Amazon Web ServicesCyber AlertCyber Alerts 2023Cyber RiskDecember 2023HackerRCE
ADVERTISEMENT

Related Posts

AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025
hpingbot Botnet Uses Pastebin C2 Channel

APT36 Targets Indian Defense Linux Systems

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

July 7, 2025
hpingbot Botnet Uses Pastebin C2 Channel

hpingbot Botnet Uses Pastebin C2 Channel

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial