HomeSample Page

Sample Page Title


WordPress fixes POP chain exposing websites to RCE attacks

WordPress has launched model 6.4.2 that addresses a distant code execution (RCE) vulnerability that might be chained with one other flaw to permit attackers run arbitrary PHP code on the goal web site.

WordPress is a extremely well-liked open-source content material administration system (CMS) used for creating and managing web sites. It’s at present utilized by greater than 800 million websites, accounting for about 45% of all websites on the web.

The mission’s safety staff found a Property Oriented Programming (POP) chain vulnerability that was launched in WordPress core 6.4, which below sure circumstances might permit arbitrary PHP code execution.

A POP chain requires an attacker to regulate all of the properties of a deserialized object, which is feasible with PHP’s unserialize() perform. A consequence of that is the chance to hijack the applying’s stream by controlling the values despatched to megic strategies akin to ‘_wakeup().

The safety concern requires the existence of a PHP object injection flaw on the goal web site, which might be current on a plugin or theme add-on, to realize a important severity.

“A Distant Code Execution vulnerability that’s not immediately exploitable in core; nonetheless, the safety staff feels that there’s a potential for prime severity when mixed with some plugins, particularly in multisite installations.” – WordPress

A PSA by WordPress safety consultants at Wordfence gives some further technical particulars on the issue, explaining that the problem is within the ‘WP_HTML_Token’ class, launched in WordPress 6.4 to enhance HTML parsing within the block editor.

The category contained a ‘__destruct‘ magic methodology, which used ‘call_user_func’ to execute a perform outlined within the ‘on_destroy’ property, with ‘bookmark_name‘ as an argument.

An attacker exploiting an object injection vulnerability might acquire management over these properties to execute arbitrary code, the researchers say.

Class destructor that conditionally executes a callback function
Class destructor that conditionally executes a callback perform (Patchstack)

Though the flaw isn’t important by itself, because of the want for object injection on put in and lively plugins or themes, the presence of an exploitable POP chain in WordPress core considerably will increase the general threat for WordPress websites.

One other notification from Patchstack safety platform for WordPress and plugins highlights that an exploit chain for this concern was uploaded a number of weeks in the past on GitHub and later added to the PHPGGC library, which is utilized in PHP utility safety testing.

Even when the vulnerability is probably important and it’s exploitable below sure circumstances, researchers suggest admins replace to the newest WordPress model. Even when most updates set up the brand new model robotically, researchers advise checking manually if the replace accomplished.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles