Security advisories indicate that while this vulnerability requires the Change Paths feature in WP Ghost to be set to “Lite” or “Ghost” mode (not enabled by default), when exploitable, it allows attackers to leverage several techniques to achieve RCE, including php:// filter chains and PHP_SESSION_UPLOAD_PROGRESS tricks. The discovery and responsible disclosure of this vulnerability highlights the ongoing security challenges facing the WordPress ecosystem, which powers approximately 43% of all websites on the internet. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. A critical vulnerability in WP Ghost, a popular WordPress security plugin with over 200,000 active installations. “This type of LFI vulnerability is particularly dangerous because it provides a direct path to executing malicious code on affected websites,” researchers said. After being notified on March 3, 2025, the plugin developer, John Darrel, promptly released version 5.4.02 on March 4 to address the vulnerability.
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 24 Mar 2025 13:45:04 +0000