TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Another wordpress core exploit in the wild

2 pointsby paritoover 8 years ago

1 comment

paritoover 8 years ago
This privilege escalation vulnerability affects the WordPress REST API that was recently added and enabled by default on WordPress 4.7.0.<p>So basically people who updated religiously were hit, and those who did not, were fine.<p>I am left wondering if running wordpress sites in read-only state (both files and database) should be the only reasonably safe method.<p>A lot of people run the files with php ownership (so they could update via &#x2F;wp-admin, or they just don&#x27;t care) which opens the site to be exploited by any vuln plugin&#x2F;theme<p>But now it looks like even running proper permissions (NOT www-data) on files is no longer enough, and we should consider mysql in read-only state when no editing is happening...<p>VERY SAD.