critical rce flaw exposed

While over 200,000 WordPress site owners sleep soundly thinking WP Ghost is protecting their digital fortresses, a critical vulnerability has left their gates wide open. The popular security plugin, developed by John Darrel, claims to stop 140,000 hacker attacks monthly. Ironic, isn’t it? The very tool designed to keep hackers out now offers them a VIP entrance.

The ultimate irony: WordPress security plugin now serves as hackers’ red carpet into 200,000 vulnerable sites.

The vulnerability (CVE-2025-26909) was discovered by researcher Dimas Maulana on February 25, 2025. It’s rated with a CVSS score of 9.6. That’s about as bad as it gets. The flaw affects all versions up to 5.4.01 and stems from insufficient input validation in the ‘showFile()’ function.

Here’s the scary part. This Local File Inclusion vulnerability doesn’t require authentication. Any random person can exploit it. No login needed. No special skills required. Just a manipulated URL path and boom – they’re in your system.

And if your “Change Paths” feature is set to Lite or Ghost mode? Even worse. Full Remote Code Execution becomes possible. Complete website takeover.

The impact is massive. Information disclosure. Session hijacking. Log poisoning. Access to source code. DoS attacks. Your entire WordPress site is fundamentally gift-wrapped for attackers.

Patchstack analyzed the flaw and notified WP Ghost developers on March 3, 2025. They responded quickly, implementing additional validation in version 5.4.02, released just a day later on March 4. Version 5.4.03 is also available now.

The whole situation highlights a painful truth about WordPress security. Third-party security plugins sometimes become the very weakness they’re supposed to protect against. Your security plugin has a security flaw. Let that sink in.

If you’re running WP Ghost, update immediately to version 5.4.02 or later. Implementing a comprehensive risk assessment could help identify such vulnerabilities before they’re exploited. Users have reported that WP Ghost can make WordPress sites sluggish in performance when CSS/JS rewriting features are active. The vulnerability exploits the ‘maybeShowNotFound()’ function that triggers vulnerable code. Without the patch, you might as well put out a welcome mat for hackers. The vulnerability was published on March 20, 2025 by multiple security resources including Mitre and NVD.

You May Also Like

Over 20,000 WordPress Sites Under Siege by the Dreaded DollyWay Malware Campaign

The silent digital parasite DollyWay has infected 20,000+ WordPress sites, disguising itself behind invisible admin accounts while redirecting millions to dangerous scams. Could your site be feeding this malware empire?

Apple Faces Security Crisis With New Webkit Zero-Day Vulnerability

Apple’s “secure” products compromised by third zero-day this year, putting billions at risk of silent device takeover. Update now or hackers gain complete control without your knowledge.

Apple’s Urgent Patch for WebKit Flaw Unveils Targeted Exploits Against High-Profile Individuals

Apple’s urgent patch fights sophisticated WebKit zero-day attacks exclusively hunting high-profile individuals. Your iPhone might be vulnerable even with ordinary browsing habits. Update immediately.

Urgent Update: Apple Battles Exploited Webkit Flaw in Ios 18.3.2

Critical Webkit flaw actively weaponized against Apple users despite previous patches. iOS 18.3.2 rushes emergency protection while fixing performance issues that plagued earlier versions. Your security depends on immediate action.