Vulnerability Management

RCE intrusions likely with critical WPLMS WordPress theme issue

Share
WordPress app logo on the screen smartphone with notebook closeup. WordPress - open source site content management system.

Malicious actors could leverage a new critical path traversal issue impacting WordPress learning management system theme WPLMS, tracked as CVE-2024-10470, to facilitate remote code execution and arbitrary file compromise, The Cyber Express reports.

Exploitation of the vulnerability, which arises from lacking file validation in the file reading and deletion-managing functions, could be conducted through the delivery of specially crafted HTTP POST requests to all all WPLMS versions up to 4.962, which would then allow critical file reading or deletion, according to cybersecurity researcher Friderika Baranyai who identified and reported the bug. Organizations' admins have been recommended to not only immediately deactivate and remove the WPLMS theme but also bolster access controls and ensure file integrity monitoring. Aside from performing regular WordPress file backups, admins should also adopt a web application firewall and the latest version 4.963 of the theme to prevent attacks that could compromise system control and data integrity.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.