Plataforma
wordpress
Componente
ark-core
Corrigido em
1.71.1
CVE-2025-26970 identifies a Remote Code Execution (RCE) vulnerability within the FRESHFACE Ark Theme Core plugin for WordPress. This flaw allows attackers to inject arbitrary code, leading to complete server compromise. The vulnerability impacts versions from 0.0.0 through 1.71.0, and a patch is available in version 1.71.0.
The RCE vulnerability in Ark Theme Core presents a severe risk. An attacker could leverage this flaw to execute arbitrary commands on the web server hosting the WordPress site. This could lead to data theft, website defacement, malware installation, or complete system takeover. Given the plugin's potential usage on numerous WordPress sites, the blast radius is significant. Successful exploitation could also enable lateral movement within the network if the server has access to other resources. The ability to inject code directly bypasses typical security controls, making it a particularly dangerous vulnerability.
CVE-2025-26970 was publicly disclosed on March 3, 2025. While no public proof-of-concept (POC) code has been released at the time of writing, the RCE nature of the vulnerability makes it a high-priority target for exploitation. The EPSS score is likely to be high, indicating a significant probability of exploitation. It is not currently listed on the CISA KEV catalog.
Websites utilizing the Ark Theme Core plugin, particularly those running older, unpatched versions (0.0.0–1.71.0), are at significant risk. Shared hosting environments where multiple websites share the same server are especially vulnerable, as a compromise of one site could potentially impact others. Sites with limited security monitoring or outdated WordPress installations are also at higher risk.
• wordpress / composer / npm:
grep -r "ark-core" /var/www/html/• wordpress / composer / npm:
wp plugin list | grep ark-core• wordpress / composer / npm:
wp plugin update ark-core --version=1.71.0• generic web: Check WordPress plugin directory for mentions of 'ark-core' and associated vulnerabilities. • generic web: Review WordPress error logs for any unusual code execution patterns or errors related to the Ark Theme Core plugin.
disclosure
Status do Exploit
EPSS
0.24% (percentil 47%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-26970 is to immediately upgrade the Ark Theme Core plugin to version 1.71.0 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider disabling the plugin entirely. As a temporary workaround, implement strict input validation and sanitization on any user-supplied data processed by the plugin. Web Application Firewalls (WAFs) can be configured to detect and block suspicious code injection attempts, although this is not a substitute for patching. Monitor WordPress logs for unusual activity or code execution attempts.
Atualize o plugin Ark Theme Core para a versão 1.71.0 ou superior para mitigar a vulnerabilidade de execução remota de código não autenticada. Verifique as atualizações disponíveis no painel de administração do WordPress ou baixe a última versão do repositório oficial do WordPress.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-26970 is a critical Remote Code Execution (RCE) vulnerability affecting the Ark Theme Core WordPress plugin, allowing attackers to execute arbitrary code.
You are affected if you are using Ark Theme Core versions 0.0.0 through 1.71.0. Check your plugin versions immediately.
Upgrade the Ark Theme Core plugin to version 1.71.0 or later. If immediate upgrade is not possible, disable the plugin.
While no public exploits are currently known, the vulnerability's severity suggests it is likely to be targeted by attackers.
Refer to the FRESHFACE website and WordPress plugin repository for the official advisory and update information.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.