平台
wordpress
组件
ark-core
修复版本
1.71.1
CVE-2025-26970 identifies a Remote Code Execution (RCE) vulnerability within the FRESHFACE Ark Theme Core plugin for WordPress. This flaw allows attackers to inject arbitrary code, leading to complete server compromise. The vulnerability impacts versions from 0.0.0 through 1.71.0, and a patch is available in version 1.71.0.
The RCE vulnerability in Ark Theme Core presents a severe risk. An attacker could leverage this flaw to execute arbitrary commands on the web server hosting the WordPress site. This could lead to data theft, website defacement, malware installation, or complete system takeover. Given the plugin's potential usage on numerous WordPress sites, the blast radius is significant. Successful exploitation could also enable lateral movement within the network if the server has access to other resources. The ability to inject code directly bypasses typical security controls, making it a particularly dangerous vulnerability.
CVE-2025-26970 was publicly disclosed on March 3, 2025. While no public proof-of-concept (POC) code has been released at the time of writing, the RCE nature of the vulnerability makes it a high-priority target for exploitation. The EPSS score is likely to be high, indicating a significant probability of exploitation. It is not currently listed on the CISA KEV catalog.
Websites utilizing the Ark Theme Core plugin, particularly those running older, unpatched versions (0.0.0–1.71.0), are at significant risk. Shared hosting environments where multiple websites share the same server are especially vulnerable, as a compromise of one site could potentially impact others. Sites with limited security monitoring or outdated WordPress installations are also at higher risk.
• wordpress / composer / npm:
grep -r "ark-core" /var/www/html/• wordpress / composer / npm:
wp plugin list | grep ark-core• wordpress / composer / npm:
wp plugin update ark-core --version=1.71.0• generic web: Check WordPress plugin directory for mentions of 'ark-core' and associated vulnerabilities. • generic web: Review WordPress error logs for any unusual code execution patterns or errors related to the Ark Theme Core plugin.
disclosure
漏洞利用状态
EPSS
0.24% (47% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-26970 is to immediately upgrade the Ark Theme Core plugin to version 1.71.0 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider disabling the plugin entirely. As a temporary workaround, implement strict input validation and sanitization on any user-supplied data processed by the plugin. Web Application Firewalls (WAFs) can be configured to detect and block suspicious code injection attempts, although this is not a substitute for patching. Monitor WordPress logs for unusual activity or code execution attempts.
将 Ark Theme Core 插件更新到 1.71.0 或更高版本,以缓解未授权远程代码执行漏洞。在 WordPress 管理面板中检查是否有可用的更新,或从 WordPress 官方仓库下载最新版本。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-26970 is a critical Remote Code Execution (RCE) vulnerability affecting the Ark Theme Core WordPress plugin, allowing attackers to execute arbitrary code.
You are affected if you are using Ark Theme Core versions 0.0.0 through 1.71.0. Check your plugin versions immediately.
Upgrade the Ark Theme Core plugin to version 1.71.0 or later. If immediate upgrade is not possible, disable the plugin.
While no public exploits are currently known, the vulnerability's severity suggests it is likely to be targeted by attackers.
Refer to the FRESHFACE website and WordPress plugin repository for the official advisory and update information.
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。