Critical RCE Flaws in 'PHP Everywhere' Plugin Affect Thousands of WordPress Sites

2 years ago 166
BOOK THIS SPACE FOR AD
ARTICLE AD

WordPress

Critical security vulnerabilities have been disclosed in a WordPress plugin known as PHP Everywhere that's used by more than 30,000 websites worldwide and could be abused by an attacker to execute arbitrary code on affected systems.

PHP Everywhere is used to flip the switch on PHP code across WordPress installations, enabling users to insert and execute PHP-based code in the content management system's Pages, Posts, and Sidebar.

Automatic GitHub Backups

The three issues, all rated 9.9 out of a maximum of 10 on the CVSS rating system, impact versions 2.0.3 and below, and are as follows -

CVE-2022-24663 - Remote Code Execution by Subscriber+ users via shortcode CVE-2022-24664 - Remote Code Execution by Contributor+ users via metabox, and CVE-2022-24665 - Remote Code Execution by Contributor+ users via gutenberg block

Successful exploitation of the three vulnerabilities could result in the execution of malicious PHP code that could be leveraged to achieve a complete site takeover.

WordPress security company Wordfence said it disclosed the shortcomings to the plugin's author, Alexander Fuchs, on January 4, following which updates were issued on January 12, 2022 with version 3.0.0 by removing the vulnerable code entirely.

Prevent Data Breaches

"The update to version 3.0.0 of this plugin is a breaking change that removes the [php_everywhere] shortcode and widget," the updated description page of the plugin now reads. "Run the upgrade wizard from the plugin's settings page to migrate your old code to Gutenberg blocks."

It's worth noting that version 3.0.0 only supports PHP snippets via the Block editor, necessitating that users who are still relying on the Classic Editor to uninstall the plugin and download an alternative solution for hosting custom PHP code.


Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read Entire Article