PHP Everywhere WordPress Plugin Remote Code Execution Alert
- CVE-2022-24663 – Remote Code Execution by Subscriber+ users via shortcode
- CVE-2022-24664 – Remote Code Execution by Contributor+ users via metabox
- CVE-2022-24665 – Remote Code Execution by Contributor+ users via Gutenberg block
If a website uses the vulnerable plugin, hackers will be able to exploit them and execute malicious PHP code, or even achieve a complete takeover of the website. WordPress security firm Wordfence disclosed the vulnerabilities to Alexander Fuchs, the plugin’s author, on January 4. Alexander Fuchs released version 3.0.0 on January 12, which completely removed the vulnerable code.
According to the PHP Everywhere description, “The update to version 3.0.0 of this plugin is a breaking change that removes the [php_everywhere] shortcode and widget. Run the upgrade wizard from the plugin’s settings page to migrate your old code to Gutenberg blocks.”