Tuesday, March 25, 2025

WP Ghost WordPress Plugin Vulnerability

 

(March 20, 21, 22, & 24, 2025)

 

A critical unauthenticated Local File Inclusion vulnerability in the WP Ghost WordPress plugin could be exploited to allow remote code execution. The flaw is "due to insufficient user input value via the URL path that will be included as a file." The issue has been patched in WP Ghost version 5.4.02; users are urged to update top the most recent version. The vulnerability was reported in late February and the patched version was released within a week. WP Ghost, which "offers protection against SQL injection, script injection, vulnerability exploitation, malware dropping, file inclusion exploits, directory traversal attacks, and cross-site scripting," has more than 200,000 active installations.
 

Editor's Note

[Neely]
CVE-2024-26909, insufficient input validation, CVSS score 9.6, impacts all versions of WP Ghost up to 5.4.01. You're only vulnerable if you've set the "Change Paths" feature to Lite or Ghost mode (disabled by default). Either way ensure you've got this one set to auto-update and the current version is installed. While you're looking, make sure you don't have any plugins waiting on explicit (manual) steps to finalize their updates.


SANS NewsBites - Annotated News Update from the Leader in Information Security Training, Certification and Research

March 25, 2025                                                            Vol. 27, Num. 23

No comments:

Post a Comment

IT logic