Close Menu
  • Home
  • SEO
  • Digital Marketing
  • SEM
  • Marketing Trends
  • Email Marketing

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

test page

25 August 2025

SEO Content Has a Packaging Problem — Whiteboard Friday

12 October 2024

Google Shows 3 Ways To Boost Digital Marketing With Google Trends

12 October 2024
Facebook X (Twitter) Instagram Threads
Avenue AdsAvenue Ads
  • Home
  • SEO
  • Digital Marketing
  • SEM
  • Marketing Trends
  • Email Marketing
Facebook X (Twitter) Instagram
Avenue AdsAvenue Ads
SEO

WordPress Releases Version 6.4.2 For Critical Vulnerability

avenueadsBy avenueads7 December 2023Updated:12 February 2024No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
WordPress Releases Version 6.4.2 For Critical Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email

[ad_1]

WordPress has launched model 6.4.2 that comprises a patch for a crucial severity vulnerability that would enable attackers to execute PHP code on the location and doubtlessly result in a full web site takeover.

The vulnerability was traced again to a characteristic launched in WordPress 6.4 that was meant to enhance HTML parsing within the block editor.

The difficulty will not be current in earlier variations of WordPress and it solely impacts variations 6.4 and 6.4.1.

An official WordPress announcement describes the vulnerability:

“A Distant Code Execution vulnerability that isn’t straight exploitable in core, nonetheless the safety group feels that there’s a potential for top severity when mixed with some plugins, particularly in multisite installs.”

In keeping with an advisory printed by Wordfence:

“Since an attacker in a position to exploit an Object Injection vulnerability would have full management over the on_destroy and bookmark_name properties, they will use this to execute arbitrary code on the location to simply achieve full management.

Whereas WordPress Core at present doesn’t have any identified object injection vulnerabilities, they’re rampant in different plugins and themes. The presence of an easy-to-exploit POP chain in WordPress core considerably will increase the hazard stage of any Object Injection vulnerability.”

Object Injection Vulnerability

Wordfence advises that Object Injection vulnerabilities should not simple to take advantage of. Nonetheless they’re recommending that customers of WordPress replace the most recent variations.

WordPress itself advises that customers replace their websites instantly.

Learn the official WordPress announcement:

WordPress 6.4.2 Maintenance & Security Release

Learn the Wordfence advisory:

PSA: Critical POP Chain Allowing Remote Code Execution Patched in WordPress 6.4.2

Featured Picture by Shutterstock/Nikulina Tatiana

[ad_2]

Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
avenueads
  • Website

Related Posts

SEO Content Has a Packaging Problem — Whiteboard Friday

12 October 2024

Google Shows 3 Ways To Boost Digital Marketing With Google Trends

12 October 2024

Google Ads announces 11-year data retention policy

12 October 2024

Reddit Makes Game-Changing Updates to Keyword Targeting

11 October 2024
Add A Comment
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Advertisement
Editors Picks

10+ Super SMART Goal Examples (& A Handy Template)

22 August 2024
8.5

Apple Planning Big Mac Redesign and Half-Sized Old Mac

5 January 2021

Autonomous Driving Startup Attracts Chinese Investor

5 January 2021

Onboard Cameras Allow Disabled Quadcopters to Fly

5 January 2021
Top Reviews
9.1

Review: T-Mobile Winning 5G Race Around the World

By avenueads
8.9

Samsung Galaxy S21 Ultra Review: the New King of Android Phones

By avenueads
8.9

Xiaomi Mi 10: New Variant with Snapdragon 870 Review

By avenueads
Advertisement

Type above and press Enter to search. Press Esc to cancel.