wordpress Archives - Patchstack Easily secure your websites from plugin vulnerabilities! Fri, 11 Jul 2025 06:23:34 +0000 en-US hourly 1 https://patchstack.com/wp-content/uploads/2026/01/cropped-favicon-32x32.png wordpress Archives - Patchstack 32 32 WordPress Salts: What Are They, How They Work, and How to Use Them https://patchstack.com/articles/understand-wordpress-salts/ https://patchstack.com/articles/understand-wordpress-salts/#respond Wed, 30 Oct 2024 16:49:12 +0000 https://patchstack.com/?p=16986 If you have been developing WordPress websites, your eyes might have wandered to the ‘WordPress salts’ section of the wp.config.php file. Have you ever wondered what these salts are and why we need them? If you answered ‘Yes’, then you are in the right place. In this post, you will learn everything you need to […]

The post WordPress Salts: What Are They, How They Work, and How to Use Them appeared first on Patchstack.

]]>
If you have been developing WordPress websites, your eyes might have wandered to the ‘WordPress salts’ section of the wp.config.php file.

Have you ever wondered what these salts are and why we need them?

If you answered ‘Yes’, then you are in the right place. In this post, you will learn everything you need to know about WordPress salts.

Let’s get started!

What Are WordPress Salts?

WordPress salts are random bits of text that are appended to user passwords and cookies before they are encrypted or hashed by WordPress security keys.

Using a modern encryption or hashing algorithm is good enough in normal scenarios. However, if a hacker steals your database, then they can ‘guess’ if the user is using a weak or common password. This is called a rainbow table attack; we have explained more about this in our post on brute force attacks

How Do WordPress Salts Work?

With the number of cyber attacks on the rise, using encryption alone is not enough to protect your data. Adding random data (salts) to your secret information will make a strong cryptographic combination that makes it harder for an attacker to guess the passwords.

This act of adding random data to information is often compared to sprinkling salt over a meal to enhance it. Therefore, in computer terminology, the act of adding random data before encrypting or hashing it is called ‘salting’. 

Let’s try to understand this with the help of an example. If your password is password123, WordPress will add a salt to it, such as !@#$%^&*, and then hash the resulting string, password123!@#$%^&*, with a security key provided by you. This hashed password will be stored in the WordPress database, and used to verify your login credentials.

When the user logs in to your WordPress site, WordPress will use the same salt and hashing algorithm to verify their password. You can find your WordPress salts in your wp-config.php file, which look something like this:

define( 'AUTH_SALT', 'random_string');
define( 'SECURE_AUTH_SALT', 'random_string');
define( 'LOGGED_IN_SALT', 'random_string');
define( 'NONCE_SALT', 'random_string');
define( 'WP_CACHE_KEY_SALT', 'random_string');

You can generate new WordPress salts and keys using the WordPress.org secret key service or using the WP-CLI, which will provide you with random and unique strings that you can copy and paste into your wp-config.php file. You should replace the default phrases, insert your unique phrase with the generated strings, and save the changes to your wp-config.php file.

How to Use WordPress Salts

WordPress automatically uses the salts and keys that are defined in your wp-config.php file to encrypt and decrypt the user passwords and cookies. You do not need to do anything for it, as WordPress handles the encryption and decryption process for you behind the scenes.

However, if you want to change your WordPress salts and keys periodically for extra security, you can use a plugin like Salt Shaker, or manually edit your wp-config.php file with new salts and keys. This is called ‘shaking the salt’, as it refreshes the encryption of your user data.

Shaking the Salt

It is possible to change these WordPress salts, however you should keep in mind that you don’t need to change these salts unless you suspect that your website has been compromised or hacked. Changing salts and keys can have some negative consequences, such as breaking some plugins or features, or logging out all users from your website. Therefore, you should only do this if you have a valid reason and you know what you are doing. 

To generate new WordPress salts and keys, and change them periodically, you can use one of the following methods:

  1. Manually generating salts: You can change your WordPress salts and keys manually by editing your wp-config.php file, which is located in the root directory of your WordPress installation. Locate the existing salt values and replace them with new text – just type anything that comes to mind. Humans are notoriously bad at coming up with random numbers. If you are in a hurry, let your cat (or small dog) walk across your keyboard and use the resulting text as your salt – it will work just as well!
  2. Use the WordPress utility: You can generate new salts and keys using the WordPress service, which will provide you with random and unique strings, and automatically update your wp-config.php file, replacing the existing ones. Just log in to your server via ssh and run the following command:
wp config shuffle-salts

Best Practices and Misconceptions 

Although it is relatively easy to access and shake salts in WordPress, there are a few things that you should keep in mind.

  1. WordPress salts are not the same as WordPress security keys. WordPress security keys are used to encrypt and decrypt the data, while WordPress salts are used to modify the data before encryption. 
  2. Keep them secret: You should never share your WordPress salts and keys with anyone, as they are used to encrypt and decrypt sensitive data on your site. If someone gets access to your salts and keys, they can compromise your site and your users’ accounts.
  3. WordPress salts do not need to be changed frequently. Some people think that regularly rotating WordPress salts will improve security, but this is false. Changing WordPress salts will only log out all users from your site – it won’t affect the existing passwords or cookies. In fact, changing WordPress salts too often can cause more harm than good, as it can create confusion and frustration for your users.
  4. WordPress salts are not a substitute for strong passwords. WordPress salts can help protect your passwords from being cracked by brute force attacks, but they cannot prevent someone from guessing your password if it is weak or common. Therefore, you should always use strong and unique passwords for your WordPress site, and encourage your users to do the same.

Conclusion

WordPress salts are a vital part of your WordPress site's security, as they help protect your passwords and cookies from being hacked. However, WordPress salts are not enough to keep your site safe from all kinds of threats. 

That's why you need Patchstack – the ultimate WordPress security solution that protects your site from hackers and bots.

Patchstack is a cloud-based WordPress security solution that blocks malicious traffic, scans your site for vulnerabilities, and patches them automatically. Patchstack also monitors your site's activity, and sends you regular reports and alerts.

With Patchstack, you can rest assured that your WordPress site is secure, fast, and reliable, leaving you to focus on growing your business and audience. Patchstack works with any WordPress site, theme, or plugin, and integrates seamlessly with your existing hosting provider.

If you are serious about WordPress security, you should start using Patchstack today!

The post WordPress Salts: What Are They, How They Work, and How to Use Them appeared first on Patchstack.

]]>
https://patchstack.com/articles/understand-wordpress-salts/feed/ 0
WordPress 6.4.3 Security Release https://patchstack.com/articles/wordpress-6-4-3-security-release/ https://patchstack.com/articles/wordpress-6-4-3-security-release/#respond Wed, 31 Jan 2024 09:12:12 +0000 https://patchstack.com/?p=16764 WordPress 6.4.3 was released on January 30th, 2024, which includes two low-severity security fixes. This security fix addresses two potential security issues. The first one is an Administrator+ arbitrary PHP file upload on the plugin and theme upload functionality. The second issue is a potential security issue that can only be exploited if another vulnerability […]

The post WordPress 6.4.3 Security Release appeared first on Patchstack.

]]>
WordPress 6.4.3 was released on January 30th, 2024, which includes two low-severity security fixes.

This security fix addresses two potential security issues. The first one is an Administrator+ arbitrary PHP file upload on the plugin and theme upload functionality. The second issue is a potential security issue that can only be exploited if another vulnerability (PHP object injection) is already present on your WordPress site.

We highly recommend you update your site to version 6.4.3 (or one of the patched versions) as soon as possible. Sites with plugins or themes installed that contain a PHP object injection vulnerability are especially at risk, so it should be a high priority to update WordPress on your site.

Patches for the two issues have been backported to version 4.1 and later on the WordPress Core.

Technical analysis

Administrator+ Arbitrary PHP File Upload

This security issue has existed since 2018. This allows the Administrator user role and Super Admin user role on multisite environments to upload PHP files directly to the site through the plugin and theme upload functionality. Note that this is only an issue if the site is implementing a process to limit the Administrator and Super Admin user role to upload a plugin or theme. The patch for this issue can be seen below:

Potential PHP Object Injection Gadget

This potential security issue will not make it into our vulnerability database as this can become exploitable only if a PHP object injection exists somewhere on the targeted WordPress site.

According to the release article, the Core team patched a potential PHP object injection gadget that could be used to gain Remote Code Execution (RCE) on the WordPress site. We notice that there is a change in how the options are stored. The process now involves sanitization using the sanitize_option function before applying another serialization process using the maybe_unserialize function. The option sanitization apparently doesn't get implemented during site installation and upgrade process in older versions. The patch can be seen below:

Since the two issues require a very high permission role or an incomplete site installation or upgrade process, there is only a very small chance that these issues will be exploited in a real-world case.

🤝 You can help us make the Internet a safer place

Plugin developer?

Streamline your disclosure process to fix vulnerabilities faster and comply with CRA.

Get started for free
Hosting company?

Protect your users too! Improve server health and earn added revenue with proactive security.

Patchstack for hosts
Security researcher?

Report vulnerabilities to our gamified bug bounty program to earn monthly cash rewards.

Learn more

The post WordPress 6.4.3 Security Release appeared first on Patchstack.

]]>
https://patchstack.com/articles/wordpress-6-4-3-security-release/feed/ 0
Is WordPress Secure? Everything You Need to Know https://patchstack.com/articles/is-wordpress-safe/ https://patchstack.com/articles/is-wordpress-safe/#respond Sun, 17 Dec 2023 09:57:20 +0000 https://patchstack.com/?p=16321 “WordPress is insecure because it is open source.” This common misconception assumes open-source software is more vulnerable simply because anyone can see the code and find flaws. However, this is not the case. Open-source software can be more secure because it has a large and active community of developers and users who can review, test, […]

The post Is WordPress Secure? Everything You Need to Know appeared first on Patchstack.

]]>
“WordPress is insecure because it is open source.”

This common misconception assumes open-source software is more vulnerable simply because anyone can see the code and find flaws.

However, this is not the case. Open-source software can be more secure because it has a large and active community of developers and users who can review, test, and improve the code. 

WordPress is the world's most popular content management system (CMS), powering over 40% of all websites. But is it safe to use? How secure is WordPress from hackers and malicious attacks? In this article, we will answer these questions and more.

Is WordPress more or less secure than its alternatives?

When choosing a website platform, one common question is whether WordPress is more or less secure than other options such as Squarespace, Shopify, Wix, Webflow, etc. The answer is not straightforward, as each platform has its advantages and disadvantages regarding security.

Most of the alternatives available in the market are proprietary and don’t offer the same flexibility and freedom as WordPress. There are no updates, and everything is managed on your behalf.

This means that with these WordPress alternatives, you don’t have to worry about updating your website, installing security plugins, or configuring your web host. The platform provider handles all your security aspects and ensures your website runs smoothly.

However, this also comes with some drawbacks.

If you are not in charge of securing your website, then it is a massive weight off your shoulders. However, you may have less control over your website's features, functionality, and design. You may also have to pay more for the services and features you need, as the platform provider may change their subscription fee anytime.

Moreover, even if the platform provider is responsible for your website's security, you might still suffer a breach or an attack.

For example, in 2020, Shopify compromised the login credentials of some of its merchants. In 2016, Wix was found to have a vulnerability that allowed hackers to take over any Wix website.

Using a managed platform might give you an illusion of security. Even though these hacks are few and far between, they do happen, and in such cases, there isn’t much that you, as an individual, can do – besides creating a support ticket and hoping. 

WordPress, on the other hand, is an open-source and self-hosted platform that gives you more freedom and flexibility to customize your website. However, this also means that you have to take care of your website's security yourself, and if your website ever gets hacked, you’ll have to sort that out yourself as well.

Therefore, the security of your website depends largely on how you manage and maintain it, regardless of the platform you choose.

Top WordPress security concerns

Although WordPress is secure, it still faces several significant security challenges that website owners and administrators must address. Since it is so popular, it is a prime target for cybercriminals, who exploit various vulnerabilities to gain unauthorized access, compromise websites, and steal sensitive information. We will discuss this at length in the next section of this post.

Common security concerns include stolen credentials, often obtained through phishing attacks, and weak password policies, which can lead to unauthorized access to administrator accounts. Brute-force attacks on the WordPress login page are another significant threat that can compromise user data and site integrity.

If you use third-party code, malware installation is a persistent risk, as it can turn websites into spam distribution networks. If you run an online store, these security breaches can be particularly devastating, as they can potentially expose customer information and financial data. 

To learn more about this topic, you should check out our previous post, where we talked to real hackers and explained how and why WordPress sites get hacked.

What are WordPress vulnerabilities, and how do they affect your website?

A WordPress vulnerability is a weakness or flaw in a theme, plugin, or WordPress core that a hacker can exploit. In other words, WordPress vulnerabilities create a point of entry that a hacker can use to pull off malicious activity.

Some of the malicious activities that hackers can perform on a vulnerable WordPress site include:

  • Redirecting visitors to scam or phishing sites.
  • Injecting malware or spam into your site’s content or database.
  • Stealing sensitive data such as user credentials, payment information, or personal details.
  • Using your website resources to launch attacks on other websites.

WordPress vulnerabilities can be classified into different types, depending on the nature and severity of the flaw. Some of the most common types of WordPress vulnerabilities are:

  • Cross-Site Scripting (XSS): This occurs when a hacker injects malicious code into your site’s web pages, which then executes in the browser of your visitors or admins. XSS can be used to steal cookies, hijack sessions, or perform actions on behalf of the victim.
  • SQL Injection (SQLi): This occurs when a hacker manipulates the SQL queries that your site uses to communicate with its database, allowing them to access, modify, or delete data. SQLi can be used to compromise your site’s integrity, confidentiality, or availability.
  • Cross-Site Request Forgery (CSRF): This occurs when a hacker tricks a user into performing an unwanted action on your site, such as changing their password, deleting their account, or making a purchase. CSRF can be used to abuse your site’s functionality or resources.

To learn more about this topic, refer to our article, which covers many widespread WordPress vulnerabilities and explains how to protect against them.

How does WordPress handle security updates and patches?

WordPress is not immune to vulnerabilities – as no software is. However, WordPress has a strong reputation for being proactive and responsive to security issues. It has an active and dedicated team of security experts who constantly monitor and fix any reported or discovered vulnerabilities.

WordPress releases regular updates and patches that address any security issues. These updates are categorized into three types:

  • Major updates: These are released every few months and introduce new features, enhancements, bug fixes, and any needed security fixes. They are indicated by a change in the first digit of the WordPress version number, such as 5.9 or 6.0.
  • Minor updates: These are released more frequently and focus on fixing security issues and bugs. They also include any compatibility or performance improvements. Minor updates are indicated by a change in the second digit of the WordPress version number, such as 6.1 or 6.3.
  • Security updates: These are released as soon as possible when a critical security issue is found. 

WordPress updates are usually automatic, meaning your site will download and install them without you taking action. However, you can also manually update your site if you prefer. You can check the current WordPress version and update the status from your site’s dashboard.

Does having the latest version of WordPress make your site bulletproof?

No! Updating WordPress will only address vulnerabilities in the WordPress core. A fully updated WordPress website can be insecure. Our State of WordPress Security report found that only about 0.58% of security vulnerabilities come from the WordPress core.

Updating your WordPress core, plugins, and themes is essential, but it is not enough to protect your site from hackers and malware. Various security flaws can arise even when your website is fully updated, such as:

  • Weak passwords and user permissions: Hackers can easily guess or crack your login credentials if you use weak or the same passwords for multiple accounts.

Similarly, giving too many users access to your site or assigning them unnecessary privileges increases the risk of unauthorized changes or malicious actions. You should always use strong and unique passwords, limit the number of users, and assign them the appropriate roles and capabilities.

  • Insecure web hosting: Your web host plays a vital role in your site’s security. If your web host is not secure, your site may be vulnerable to attacks from hackers or malicious users who share the same server. You should always choose a reputable and secure web host with features such as SSL certificates, firewall protection, and DDoS prevention.
  • Outdated or unused plugins and themes: You may have outdated or unused plugins and themes installed on your site. These plugins and themes may contain security vulnerabilities that hackers can exploit to access your site or inject malicious code. You should always delete any plugins and themes you don’t need.
  • Using nulled themes and plugins: These are often distributed by hackers or unscrupulous websites that modify the original code to insert malware or remove security features. Therefore, avoiding using nulled themes and plugins is advisable instead of purchasing them from reputable sources or using free alternatives. 

Best practices for keeping your WordPress site secure

WordPress security is not the sole responsibility of your hosting provider. While they provide some essential security features and services, they are not enough to protect your site from all possible threats. You still need to take proactive and preventive measures to secure your site.

WordPress does a great job of keeping your site secure, but there are also some steps that you can take to enhance its security and prevent potential attacks.

To secure your WordPress site on your own, you must follow some of the best practices mentioned in our previous articles, such as updating your WordPress core, themes, and plugins, using strong passwords, enabling 2FA, and installing a security plugin. You must also be aware of the common WordPress vulnerabilities and how to prevent them.

We have published a lot of interesting articles that can guide you. To learn more about WordPress security and how to secure your site on your own, you can check out these resources:

Do’s and don’ts in WordPress security

This section will provide some essential tips on keeping your website safe from cyber attacks.

Don’t use plugin-based malware scanners

Although plugin-based malware scanners are helpful, they are not infallible. These scanners rely on heuristics or pattern-matching algorithms, which can be evaded by clever malware. On the other hand, some scanners excel at detection but struggle with false positives, which makes them less useful.

The worst part is that malware scanners wait until your website is infected to detect them. If you want a proactive approach, you should use Patchstack, a WordPress vulnerability detection plugin that automatically protects your website if any vulnerabilities are identified.

But using Packstack is just one piece of the puzzle. At Patchstack, we recommend a multi-layered approach that combines different scanning techniques with human expertise, as this is often more effective in identifying and removing malicious code.

Secure websites before they go live

Some developers use basic and insecure passwords when developing websites, but we believe website security should be prioritized when a site becomes publicly accessible.

You might think that your site barely gets any traffic and that hackers won’t spend resources to try to hack it. But this is completely wrong!

Hackers constantly scan the Internet for vulnerabilities, outdated software, and configuration errors. Even seemingly unimportant sites can be targeted for watering hole attacks or to host malware. Once hacked, these sites are used for other malicious purposes, such as cloaking and phishing emails. Read our “What Is SEO Spam And Cloaking?” post to learn more. 

Don’t rely on plug-and-play WordPress security

As long as your website is on the Internet, it is constantly under attack. No matter how you protect it, you should not set it and forget it. No service can guarantee 100% security, as it's an ongoing risk management process.

Daily, dozens of new vulnerabilities are discovered in WordPress plugins and themes. Hackers can exploit this and take control of all the websites on your server, even if only one of your sites is using the vulnerable version. Therefore, using WordPress security services to protect your WordPress site is always recommended. 

However, relying solely on security plugins or third-party services without understanding the underlying principles can create a false sense of security. You should also actively check your security logs and stay informed about potential threats. 

Read our post on the best activity log plugins to determine which plugin suits your needs.

What do you do when a website is hacked?

If you suspect your website has been hacked, you need to take action immediately. 

First, you should isolate the site to prevent further damage. You can do this by blocking the network access to the site and enforcing firewall rules to stop unauthorized traffic from the server. 

Once you have isolated the site, conduct a thorough security audit to identify the extent of the breach. If your network has multiple servers, you should check all the servers instead of just the one infected by malware.

Next, if available, you should restore from a clean backup, but ensure the vulnerability is patched first. This can be challenging, but fortunately, many cybersecurity companies offer website cleaning services.

Finally, you should strengthen security measures and monitor closely to prevent future attacks. Our Complete Guide To WordPress Security is a great place to learn about security! 

Final thoughts

WordPress is a secure and reliable platform that powers millions of websites worldwide. However, no software is perfect, and WordPress can still face security challenges and threats from hackers and malicious actors. That’s why you need to take responsibility for your site’s security and follow the best practices and tips we have shared in this article.

By keeping your WordPress core, themes, and plugins updated, using strong passwords and 2FA, installing a security plugin, and following the other best practices, you can significantly reduce the risk of getting hacked or compromised and enjoy a safe and smooth WordPress experience.

If you want to learn more about WordPress security, we highly recommend you read our whitepaper, WordPress Security Stats. It contains valuable insights and data on WordPress security, the most common vulnerabilities, the most vulnerable plugins and themes, and more.

Patchstack maintains a real-time database that tracks and monitors all reported or discovered WordPress vulnerabilities. You can search, filter, and sort the vulnerabilities by various criteria.

Using Patchstack, you can also get notified 48 hours before a vulnerability is publicly disclosed, giving you enough time to update or patch your site.

Leading security experts trust Patchstack in the WordPress community. You can try Patchstack for free and see how it can improve your WordPress security.

FAQs on WordPress security

Is WordPress secure out of the box?

WordPress core is generally secure, but it's not invulnerable. Many security issues arise from outdated software, weak passwords, or vulnerable plugins and themes. Maintaining a secure WordPress site requires ongoing attention and best practices.

Do I need a security plugin for my WordPress site?

While security plugins can be helpful, they're not a complete solution. They can provide additional layers of protection but shouldn't be relied upon exclusively. Proper configuration, regular updates, and good security practices are equally important. Check out Patchstack for monitoring your WordPress security.

How often should I update WordPress and its plugins?

You should update WordPress core, plugins, and themes as soon as security updates are available. It's wise to test in a staging environment first for feature updates. 

Can using a strong password make a difference?

Absolutely. Strong, unique passwords are your first line of defense against brute-force attacks. Use a combination of uppercase and lowercase letters, numbers, and symbols. Consider using a password manager to generate and store complex passwords securely.

Is shared hosting secure for WordPress sites?

Shared hosting can be secure if the provider implements proper isolation between accounts. However, it may be more vulnerable to certain attacks than dedicated or managed WordPress hosting. 

Do I need an SSL certificate for my WordPress site?

An SSL certificate is needed to encrypt data transmission between your server and visitors' browsers. It protects sensitive information, boosts your site's SEO, and builds trust with users. Many hosting providers offer free SSL certificates through Let's Encrypt or ZeroSSL.

Can I make my WordPress admin area more secure?

You can enhance admin security by changing the default login URL, implementing two-factor authentication, and limiting login attempts. Also, use strong passwords for all admin accounts and avoid using "admin" as a username.

How can I protect my WordPress site from brute-force attacks?

Implement measures such as limiting login attempts, using strong passwords, and enabling two-factor authentication. You can also consider using a web application firewall (WAF) or security plugins that offer brute-force protection features.

Are free WordPress themes and plugins safe to use?

Not all free themes and plugins are created equal in terms of security. Only download themes and plugins from reputable sources, like the official WordPress repository. Before installing, check reviews, update frequency, and the developer's reputation.

How often should I back up my WordPress site?

For active sites, you should back up your WordPress site regularly, ideally daily. Moreover, you should store backups in a secure, off-site location for maximum security. 

Is it necessary to hide my WordPress version number?

While hiding the version number can make it slightly harder for attackers to identify vulnerabilities, it's not a robust security measure. Focus on keeping WordPress updated and following security best practices instead of relying on security through obscurity.

Can I scan my WordPress site for malware myself?

Various tools and plugins are available for malware scanning but are not foolproof. Professional security services often provide more thorough scans. Your best defense against malware is regularly monitoring, updating software, and maintaining good security practices.

The post Is WordPress Secure? Everything You Need to Know appeared first on Patchstack.

]]>
https://patchstack.com/articles/is-wordpress-safe/feed/ 0
WordPress 6.4.2 Security Release https://patchstack.com/articles/wordpress-core-6-4-2-security-release/ https://patchstack.com/articles/wordpress-core-6-4-2-security-release/#respond Wed, 06 Dec 2023 18:50:19 +0000 https://patchstack.com/?p=16188 WordPress 6.4.2 has been released on December 6th, 2023, which includes an important security fix. This security fix addresses a potential security issue that can only be exploited if another vulnerability (PHP object injection) is already present on your WordPress site. This was originally introduced in version 6.4.0 of WordPress and was also available in […]

The post WordPress 6.4.2 Security Release appeared first on Patchstack.

]]>
WordPress 6.4.2 has been released on December 6th, 2023, which includes an important security fix.

This security fix addresses a potential security issue that can only be exploited if another vulnerability (PHP object injection) is already present on your WordPress site. This was originally introduced in version 6.4.0 of WordPress and was also available in version 6.4.1 of WordPress core.

We highly recommend you update your site to version 6.4.2 as soon as possible, even if you are not running version 6.4.0 or 6.4.1. Sites that have any plugins or themes installed that contain a PHP object injection vulnerability are especially at risk, so it should be a high priority to update WordPress on your site as soon as possible!

Technical analysis

In version 6.4.0 of WordPress, a new class called WP_HTML_Token was introduced with a __destruct() function that can call any callable function.

At first sight, this may not be interesting, but in combination with a PHP object injection vulnerability, this can be exploited to execute arbitrary PHP functions on the WordPress site. If you want to learn more about PHP object injection, visit this blog post.

Since an exploitation chain was made available several weeks ago on GitHub and added to the PHPGGC project, it has made it significantly easier for malicious users to exploit any PHP object injection vulnerability present on a website.

If you are a developer and any of your projects contain function calls to the unserialize function, we highly recommend you swap this with something else, such as JSON encoding/decoding using the json_encode and json_decode PHP functions.

🤝 You can help us make the Internet a safer place

Plugin developer?

Streamline your disclosure process to fix vulnerabilities faster and comply with CRA.

Get started for free
Hosting company?

Protect your users too! Improve server health and earn added revenue with proactive security.

Patchstack for hosts
Security researcher?

Report vulnerabilities to our gamified bug bounty program to earn monthly cash rewards.

Learn more

The post WordPress 6.4.2 Security Release appeared first on Patchstack.

]]>
https://patchstack.com/articles/wordpress-core-6-4-2-security-release/feed/ 0