WordPress 6.4.2 Update Addresses Critical Remote Code Execution Vulnerability

Global Business Outlook
1 min readDec 14, 2023

--

WordPress, powering over half the internet, faces a security challenge with its 6.4.2 update. Addressing a vulnerability tied to remote code execution, this poses a significant risk given WordPress’s widespread usage. The reported Property Oriented Programming (POP) chain vulnerability in version 6.4 requires a PHP object injection vulnerability in the target website, often arising from add-ons or susceptible plugins.

While WordPress acknowledges a Remote Code Execution vulnerability in the core, it becomes critical when paired with certain plugins, particularly in multisite installations. The potential severity prompted a recent security update, though the core vulnerability isn’t immediately exploitable.

With 800 million sites, WordPress is by far the most widely used website builder available.
Wordpress.

A Patchstack warning reveals an exploit chain in the PHPGGC library, uploaded to GitHub weeks prior. With 800 million sites using WordPress, its popularity makes it a target. Notably, vulnerabilities often stem from plugins, add-ons, and free themes, where developers may abandon projects, leaving vulnerabilities unaddressed. As cyber threats loom, vigilance in updating and securing plugins becomes crucial for the millions relying on WordPress for website building.

--

--

Global Business Outlook
Global Business Outlook

Written by Global Business Outlook

We are a UK-based magazine covering key industries for industry leaders, sharing in-depth insights on trends and strategies worldwide.

No responses yet