Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WordPress RCE Vulnerability Fixed

December 8, 2023
Reading Time: 2 mins read
in Alerts
WordPress RCE Vulnerability Fixed

WordPress has issued version 6.4.2 to remedy a recently discovered remote code execution (RCE) vulnerability tied to a Property Oriented Programming (POP) chain flaw within WordPress core 6.4. This vulnerability, detected by the project’s security team, introduces the risk of arbitrary PHP code execution, especially when combined with certain plugins or themes. The critical aspect of this security concern lies in the need for an attacker to control all properties of a deserialized object, facilitated by PHP’s unserialize() function.

A consequence of this control is the potential to manipulate the application’s flow by influencing values sent to magic methods like ‘_wakeup()’. While the RCE vulnerability is not directly exploitable in the WordPress core, the security team highlights its potential severity when combined with specific plugins, particularly in multisite installations. The risk is contingent on the existence of a PHP object injection flaw on the target site, which might be present in a plugin or theme add-on. A PSA by WordPress security experts at Wordfence delves into technical details, pointing to the ‘WP_HTML_Token’ class introduced in WordPress 6.4 to enhance HTML parsing in the block editor as the source of the issue.

The class’s ‘__destruct’ magic method, utilizing ‘call_user_func’ to execute a function defined in the ‘on_destroy’ property, becomes exploitable in the context of an object injection vulnerability, allowing an attacker to gain control over properties and execute arbitrary code. While the severity of this vulnerability increases the overall risk for WordPress sites, its exploitation is not standalone. Object injection on installed and active plugins or themes is a prerequisite for a successful attack. Despite this, the security community emphasizes the importance of site administrators updating to the latest WordPress version (6.4.2) to mitigate potential risks. Although most updates are designed to install automatically, manual verification is recommended to ensure the completion of the update process. The urgency is underlined by the existence of an exploit chain for this issue, discovered on GitHub and later added to the PHPGGC library, which is widely used in PHP application security testing. In summary, while the RCE vulnerability is contingent on specific conditions, a proactive approach to updating remains crucial for securing WordPress sites.

Referral link

  • PSA Critical
Tags: Amazon Web ServicesCyber AlertCyber Alerts 2023Cyber RiskDecember 2023HackerRCE
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial