CRITICALCVE-2025-53577CVSS 10

WordPress Global DNS Plugin <= 3.1.0 - Remote Code Execution (RCE) Vulnerability

翻译中…

平台

wordpress

组件

global-dns

修复版本

3.1.1

AI Confidence: highNVDEPSS 0.1%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-53577 represents a Remote Code Execution (RCE) vulnerability within the hp Global DNS software. This flaw, stemming from improper control of code generation (code injection), enables attackers to achieve Remote Code Inclusion. Versions of Global DNS from 0.0.0 through 3.1.0 are affected. A patch is available in version 3.1.1.

WordPress

检测此 CVE 是否影响你的项目

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。

影响与攻击场景翻译中…

The impact of CVE-2025-53577 is severe. Successful exploitation allows an attacker to execute arbitrary code on the affected Global DNS server. This could lead to complete system compromise, including data exfiltration, modification, and denial of service. Given the role of DNS servers in resolving domain names, a compromised Global DNS server could be leveraged to redirect traffic to malicious sites, facilitating phishing attacks or malware distribution. Lateral movement within the network is also a significant concern, as an attacker could use the compromised DNS server as a springboard to attack other systems. The blast radius extends to all clients relying on the affected DNS server for name resolution, potentially impacting a large number of users and services.

利用背景翻译中…

CVE-2025-53577 was published on 2025-08-20. The vulnerability's EPSS score is currently pending evaluation, but the CRITICAL CVSS score suggests a high probability of exploitation. Public proof-of-concept (POC) code is not yet publicly available, but the nature of the RCE vulnerability makes it likely that such code will emerge. Given the potential for widespread impact, organizations should prioritize patching this vulnerability. No active campaigns have been publicly reported at this time, but the vulnerability's severity warrants heightened vigilance.

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.06% (19% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H10.0CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeChanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
已改变 — 攻击可以超出脆弱组件,影响其他系统。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件global-dns
供应商thehp
影响范围修复版本
0.0.0 – 3.1.03.1.1

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. 修改日期
  4. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-53577 is to upgrade to version 3.1.1 of hp Global DNS. If immediate upgrade is not feasible, consider implementing temporary workarounds. Network segmentation can limit the potential impact of a successful exploit by isolating the DNS server from critical systems. Implement strict input validation and sanitization on any data processed by the Global DNS server to prevent code injection. While a direct WAF rule is unlikely, a WAF can be configured to detect and block suspicious code execution attempts. Monitor DNS server logs for unusual activity, such as unexpected code execution or attempts to access sensitive files. After upgrading to version 3.1.1, verify the fix by attempting to trigger the vulnerability using known exploit techniques and confirming that they are no longer successful.

修复方法翻译中…

Actualice el plugin Global DNS a la última versión disponible para mitigar la vulnerabilidad de ejecución remota de código.  Verifique la fuente oficial del plugin (Codecanyon) para obtener la versión más reciente y las instrucciones de actualización.  Considere deshabilitar o eliminar el plugin si no es esencial para su sitio web.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-53577 — Remote Code Execution (RCE) in Global DNS?

It's a CRITICAL Remote Code Execution (RCE) vulnerability in hp Global DNS, allowing attackers to include and execute arbitrary code.

Am I affected by CVE-2025-53577 in Global DNS?

If you are using hp Global DNS versions 0.0.0 through 3.1.0, you are potentially affected by this vulnerability.

How do I fix CVE-2025-53577 in Global DNS?

Upgrade to version 3.1.1 of hp Global DNS. If immediate upgrade isn't possible, implement temporary workarounds like network segmentation and input validation.

Is CVE-2025-53577 being actively exploited?

No active campaigns have been publicly reported, but the vulnerability's severity suggests a high risk of exploitation.

Where can I find the official Global DNS advisory for CVE-2025-53577?

Refer to the official hp security advisory and the NVD entry for CVE-2025-53577 for detailed information.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。