WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ

Ðû²¼Ê±¼ä 2026-04-24

1. WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃWordPress Breeze Cache»º´æ²å¼þÖеÄÒ»¸öÑÏÖØÇå¾²Îó²î £¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÏòЧÀÍÆ÷ÉÏ´«í§ÒâÎļþ¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-3844 £¬£¬£¬£¬£¬£¬£¬ÑÏÖØÐÔÆÀ·ÖΪ9.8·Ö£¨Âú·Ö10·Ö£©¡£¡£¡£¡£Çå¾²¹«Ë¾WordfenceÒѼì²âµ½Áè¼Ý170´ÎÕë¶Ô¸ÃÎó²îµÄÏÖʵ¹¥»÷ʵÑé £¬£¬£¬£¬£¬£¬£¬Åú×¢ÆäÒѱ»ºÚ¿ÍÔÚÕæÊµÍøÂçÇéÐÎÖдó¹æÄ£Ê¹Óᣡ£¡£¡£Breeze Cache²å¼þÓÉCloudways¿ª·¢ £¬£¬£¬£¬£¬£¬£¬»îÔ¾×°ÖÃÁ¿Áè¼Ý40Íò¸ö¡£¡£¡£¡£¸Ã²å¼þµÄÖ÷Òª¹¦Ð§ÊÇͨ¹ý»º´æ¡¢ÎļþÓÅ»¯ºÍÊý¾Ý¿âÕûÀíÀ´Ìá¸ßÍøÕ¾ÐÔÄܺͼÓÔØËÙÂÊ¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Hung Nguyen·¢Ã÷²¢±¨¸æ £¬£¬£¬£¬£¬£¬£¬ÆäȪԴÔÚÓÚ²å¼þÖС°fetch_gravatar_from_remote¡±º¯ÊýȱÉÙ¶ÔÉÏ´«ÎļþµÄÀàÐÍÑéÖ¤ £¬£¬£¬£¬£¬£¬£¬µ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòЧÀÍÆ÷ÉÏ´«í§Òâ¶ñÒâÎļþ £¬£¬£¬£¬£¬£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´Ðв¢ÍêÈ«½ÓÊÜÄ¿µÄÍøÕ¾¡£¡£¡£¡£CVE-2026-3844Ó°ÏìBreeze CacheµÄËùÓа汾 £¬£¬£¬£¬£¬£¬£¬°üÀ¨2.4.4¼°¸üÔç°æ±¾¡£¡£¡£¡£CloudwaysÒÑÔÚ±¾ÖÜÔçЩʱ¼äÐû²¼ÁË2.4.5°æ±¾ £¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÕâÒ»Çå¾²Îó²î¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/


2. Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬Bitwarden CLIµÄnpm·Ö·¢ÇþµÀÔøÒ»¶È±»¹¥ÆÆ £¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«¶ñÒâ°æ±¾µÄ@bitwarden/cli°ü£¨°æ±¾2026.4.0£©ÉÏ´«ÖÁnpm¿ÍÕ» £¬£¬£¬£¬£¬£¬£¬¸Ã°ü°üÀ¨Ò»¸öÄܹ»ÇÔȡƾ֤²¢×ÔÎÒÈö²¥µÄÓÐÓÃÔØºÉ¡£¡£¡£¡£¸Ã¶ñÒâ°æ±¾ÓÚ2026Äê4ÔÂ22ÈÕÃÀ¹ú¶«²¿Ê±¼äÏÂÖç5:57ÖÁÍíÉÏ7:30ʱ´ú¿É¹©ÏÂÔØ £¬£¬£¬£¬£¬£¬£¬Ëæºó±»É¾³ý¡£¡£¡£¡£Bitwarden֤ʵÁË´Ë´ÎÊÂÎñ £¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖй¶½öÓ°ÏìÁËCLIµÄnpm·Ö·¢ÇþµÀ £¬£¬£¬£¬£¬£¬£¬ÇÒ½öÏÞÓÚÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§¡£¡£¡£¡£ÊÓ²ìδ·¢Ã÷ÈκÎÖ¤¾ÝÅú×¢×îÖÕÓû§´æ´¢¿âÊý¾Ý¡¢Éú²úÊý¾Ý»òÉú²úϵͳÔâµ½ÆÆË𡣡£¡£¡£Ò»µ©·¢Ã÷ÎÊÌâ £¬£¬£¬£¬£¬£¬£¬BitwardenÁ¬Ã¦×÷·ÏÁ˱»µÁÓõĻá¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬ÆúÓÃÁ˶ñÒânpm°æ±¾ £¬£¬£¬£¬£¬£¬£¬²¢Æô¶¯Á˵÷½â²½·¥¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçÊܺ¦ÏµÍ³ÖеÄnpmÁîÅÆ¡¢GitHubÈÏÖ¤ÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°AWS¡¢AzureºÍGoogle CloudµÄÔÆÆ¾Ö¤¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹¾ßÓÐ×ÔÎÒÈö²¥ÄÜÁ¦ £¬£¬£¬£¬£¬£¬£¬ËüÄܹ»Ê¹ÓÃÇÔÈ¡µÄnpmƾ֤ʶ±ðÊܺ¦ÕßÓÐȨÐ޸ĵÄÈí¼þ°ü £¬£¬£¬£¬£¬£¬£¬²¢½«¶ñÒâ´úÂë×¢ÈëÆäÖС£¡£¡£¡£Socket»¹ÊӲ쵽ÓÐÓÃÔØºÉÕë¶ÔCI/CDÇéÐÎ £¬£¬£¬£¬£¬£¬£¬ÊÔÍ¼ÍøÂç¿ÉÓÃÓÚÀ©Õ¹¹¥»÷µÄÃÜÔ¿¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/


3. TrigonaÀÕË÷Èí¼þÆôÓö¨ÖÆÊý¾ÝÇÔÈ¡¹¤¾ß


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬½üÆÚ·¢Ã÷µÄTrigonaÀÕË÷Èí¼þ¹¥»÷ÖÐ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÒ»¿îÃûΪ¡°uploader_client.exe¡±µÄ×Ô½ç˵ÏÂÁîÐй¤¾ßÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£Õâ¿î¶¨Öƹ¤¾ßÄܹ»¸ü¿ì¡¢¸ü¸ßЧµØ´ÓÊÜѬȾÇéÐÎÖÐÇÔÈ¡Êý¾Ý £¬£¬£¬£¬£¬£¬£¬Í¬Ê±¹æ±ÜÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£ÈüÃÅÌú¿ËÑо¿Ö°Ô±ÒÔΪ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßתÏòʹÓö¨Öƹ¤¾ß £¬£¬£¬£¬£¬£¬£¬Åú×¢ËûÃÇÕýÔÚͶÈëʱ¼äºÍ¾«Éñ¿ª·¢×¨ÓжñÒâÈí¼þ £¬£¬£¬£¬£¬£¬£¬ÒÔÆÚÔÚ¹¥»÷µÄÒªº¦½×¶Î¼á³Ö½ÏµÍµÄ¿É¼û¶È £¬£¬£¬£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃRcloneºÍMegaSyncµÈ¹ûÕæ¹¤¾ß £¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¤¾ßͨ³£»£»£»£»á´¥·¢Çå¾²¾¯±¨¡£¡£¡£¡£¸Ã¶¨Öƹ¤¾ßÅþÁ¬µ½Ò»¸öÓ²±àÂëµÄЧÀÍÆ÷µØµã £¬£¬£¬£¬£¬£¬£¬ÔÚÐÔÄÜÓë¹æ±ÜÄÜÁ¦ÉÏ×öÁ˶àÏîÓÅ»¯£ºÖ§³Öÿ¸öÎļþͬʱ½¨ÉèÎå¸öÅþÁ¬ £¬£¬£¬£¬£¬£¬£¬Í¨¹ý²¢ÐÐÉÏ´«ÊµÏÖ¸ü¿ìµÄÊý¾Ýй¶£»£»£»£»Ã¿´«Êä2GBÁ÷Á¿ºóÂÖ»»TCPÅþÁ¬ £¬£¬£¬£¬£¬£¬£¬ÒÔ¹æ±ÜÍøÂç¼à¿Ø£»£»£»£»¿ÉÑ¡ÔñÐÔµØÉ¸Ñ¡ÎļþÀàÐÍ £¬£¬£¬£¬£¬£¬£¬É¨³ý´óÐÍ¡¢µÍ¼ÛÖµµÄýÌåÎļþ£»£»£»£»Ê¹ÓÃÉí·ÝÑéÖ¤ÃÜÔ¿ÏÞÖÆÍⲿְԱ¶Ô±»ÇÔÊý¾ÝµÄ»á¼û¡£¡£¡£¡£ÔÚÒ»´ÎÒѼͼµÄ¹¥»÷ÊÂÎñÖÐ £¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß±»ÓÃÀ´ÇÔÈ¡ÍøÂçÇý¶¯Æ÷Éϵĸ߼ÛÖµÎĵµ £¬£¬£¬£¬£¬£¬£¬ÀýÈ緢ƱºÍPDFÎļþ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/


4. UNC6692½èTeamsÌᳫÉç½»¹¤³Ì¹¥»÷


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬´Ëǰδ¼Í¼ÔÚ°¸µÄÍþв»î¶¯¼¯ÈºUNC6692±»·¢Ã÷ʹÓÃMicrosoft Teams¾ÙÐÐÉç½»¹¤³Ì¹¥»÷ £¬£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾµÄÖ÷»úÉϰ²ÅÅÃûΪSNOWµÄ¶¨ÖÆÄ£¿£¿ £¿£¿£¿£¿é»¯¶ñÒâÈí¼þÌ×¼þ¡£¡£¡£¡£Óë½üÄêÀ´Ðí¶àÆäËûÈëÇÖÊÂÎñÀàËÆ £¬£¬£¬£¬£¬£¬£¬UNC6692ÑÏÖØÒÀÀµÃ°³äITЧÀĮ́Ա¹¤ £¬£¬£¬£¬£¬£¬£¬ÓÕÆ­Êܺ¦Õß½ÓÊÜÀ´×ÔÆä×éÖ¯ÍⲿÕË»§µÄMicrosoft Teams̸ÌìÔ¼Çë¡£¡£¡£¡£¸Ã¼¯ÈºÒѱ»Ö¤ÊµÓëÒ»³¡´ó¹æÄ£µç×ÓÓʼþºäÕ¨»î¶¯ÓÐ¹Ø £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈͨ¹ý´ó×ÚÀ¬»øÓʼþÑÍûĿµÄÓû§µÄÊÕ¼þÏäÖÆÔìÐéα½ôÆÈ¸Ð £¬£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ýTeamsð³äITÖ§³ÖÍÅ¶Ó £¬£¬£¬£¬£¬£¬£¬Éù³Æ¿ÉЭÖú½â¾öÓʼþÎÊÌâ¡£¡£¡£¡£ReliaQuest±¨¸æÏÔʾ £¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓôËÒªÁìÕë¶ÔÆóÒµ¸ß¹ÜºÍ¸ß¼¶Ô±¹¤ÒÔ»ñÈ¡ÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ £¬£¬£¬£¬£¬£¬£¬½ø¶ø¾ÙÐÐÊý¾ÝÇÔÈ¡¡¢ºáÏòÒÆ¶¯¡¢ÀÕË÷Èí¼þ°²ÅźÍڲƭÀÕË÷¡£¡£¡£¡£UNC6692ÔÚ»ñµÃ³õʼ»á¼ûºó»¹Ö´ÐÐÁ˺áÏòÒÆ¶¯£¨É¨Ãè135/445/3389¶Ë¿Ú£©¡¢Í¨¹ýPsExec½¨Éè»á»°¡¢Ê¹ÓÃWMTÌáÈ¡LSASSÀú³ÌÄÚ´æ¾ÙÐÐȨÏÞÌáÉý £¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃPass-The-HashÊÖÒÕºáÏòÒÆ¶¯µ½Óò¿ØÖÆÆ÷ £¬£¬£¬£¬£¬£¬£¬ÏÂÔØFTK Imager²¶»ñActive DirectoryÊý¾Ý²¢Í¨¹ýLimeWireй¶¡£¡£¡£¡£


https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html


5. Checkmarx KICS Docker¾µÏñÓëVSCodeÀ©Õ¹ÔâÈëÇÖ


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËCheckmarx KICSÆÊÎö¹¤¾ßµÄDocker¾µÏñ¡¢VSCodeºÍOpen VSXÀ©Õ¹ £¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó¿ª·¢Ö°Ô±ÇéÐÎÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£SocketÔÚÊÕµ½Docker¹ØÓÚ¶ñÒâ¾µÏñ±»ÍÆË͵½¹Ù·½checkmarx/kics Docker Hub¿ÍÕ»µÄ¾¯±¨ºóÕö¿ªÊÓ²ì £¬£¬£¬£¬£¬£¬£¬·¢Ã÷´Ë´ÎÈëÇÖ²»µ«ÏÞÓÚ±»Ö²ÈëľÂíµÄDocker¾µÏñ £¬£¬£¬£¬£¬£¬£¬»¹²¨¼°VSCodeºÍOpen VSXÀ©Õ¹¡£¡£¡£¡£ÕâЩÀ©Õ¹ÏÂÔØÁËÒ»¸öÒþ²ØµÄ¡°MCP²å¼þ¡±¹¦Ð§ £¬£¬£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÓÃÓÚ»ñÈ¡ÇÔÈ¡ÉñÃØµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£Socket·¢Ã÷ £¬£¬£¬£¬£¬£¬£¬¡°MCP²å¼þ¡±¹¦Ð§ÊÇ´ÓÓ²±àÂëµÄGitHub URLÏÂÔØµÄ¡°¶à½×¶Îƾ֤ÇÔÈ¡ºÍÈö²¥×é¼þ¡± £¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þרÃÅÕë¶ÔKICS´¦Öóͷ£µÄÊý¾Ý £¬£¬£¬£¬£¬£¬£¬°üÀ¨GitHubÁîÅÆ¡¢ÔÆÆ¾Ö¤¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿¡¢ClaudeÉèÖúÍÇéÐαäÁ¿¡£¡£¡£¡£ÐèÒª×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬£¬£¬Docker±êÇ©±»ÔÝÊ±ÖØ¶¨Ïòµ½Ò»¸ö¶ñÒâÕªÒª £¬£¬£¬£¬£¬£¬£¬Òò´ËÓ°ÏìÈ¡¾öÓÚ¾µÏñ±»À­È¡µÄʱ¼ä¡£¡£¡£¡£TeamPCPºÚ¿Í¹ûÕæÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£CheckmarxÒÑÐû²¼Ç徲ͨ¸æ £¬£¬£¬£¬£¬£¬£¬È·ÈÏËùÓжñÒâ³ÌÐòÒÑɾ³ý £¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄƾ֤Òѱ»×÷·Ï²¢ÂÖ»» £¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëÍⲿר¼ÒÏàÖúÊӲ졣¡£¡£¡£½¨ÒéÊÜÓ°ÏìÓû§×èÖ¹»á¼ûÌØ¶¨¶ñÒâÓòÃû £¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÀο¿SHAÖµ £¬£¬£¬£¬£¬£¬£¬»Ö¸´µ½ÒÑÖªÇå¾²°æ±¾¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/


6. CISA½ôÆÈ±Þ²ßÕþ¸®»ú¹¹ÐÞ²¹DefenderÁãÈÕÎó²î


4ÔÂ23ÈÕ £¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÏÂÁîÁª°î»ú¹¹ÔÚÁ½ÖÜÄÚ½ÓÄɲ½·¥ £¬£¬£¬£¬£¬£¬£¬±£»£»£»£»¤ÆäWindowsϵͳÃâÊÜÒ»¸öÒѱ»ÓÃÓÚÁãÈÕ¹¥»÷µÄMicrosoft DefenderȨÏÞÌáÉýÎó²îµÄË𺦡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-33825 £¬£¬£¬£¬£¬£¬£¬´úºÅ¡°BlueHammer¡± £¬£¬£¬£¬£¬£¬£¬ÊôÓÚ¸ßΣ¼¶±ð¡£¡£¡£¡£ËüÔÊÐíµÍȨÏÞµÄÍâµØÍþвÐÐΪÕßʹÓûá¼û¿ØÖÆÁ£¶ÉÏ꾡µÄÈõµã £¬£¬£¬£¬£¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏ»ñµÃSYSTEM×î¸ßȨÏÞ¡£¡£¡£¡£Î¢ÈíÓÚ4ÔÂ14ÈÕÔÚ¡°²¹¶¡ÐÇÆÚ¶þ¡±»î¶¯ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£´ËǰһÖÜ £¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±¡°Chaotic Eclipse¡±Îª¿¹Òé΢ÈíÇå¾²ÏìÓ¦ÖÐÐÄ£¨MSRC£©µÄÎó²îÅû¶Á÷³Ì £¬£¬£¬£¬£¬£¬£¬²»µ«½«Îó²îÃüÃûΪBlueHammer £¬£¬£¬£¬£¬£¬£¬»¹¹ûÕæÐû²¼ÁË¿´·¨Ñé֤ʹÓôúÂë¡£¡£¡£¡£¸üΪÑÏËàµÄÊÇ £¬£¬£¬£¬£¬£¬£¬Huntress LabsÇå¾²Ñо¿Ö°Ô±ÓÚ4ÔÂ16ÈÕÅû¶ £¬£¬£¬£¬£¬£¬£¬ÒÑÓй¥»÷ÕßʹÓÃÕâЩÁãÈÕÎó²î·¢¶¯ÏÖʵ¹¥»÷ £¬£¬£¬£¬£¬£¬£¬ÇÒÏÔʾ³ö¡°ÏÖʵ²Ù×÷¼üÅ̵ÄÍþвÐÐΪÕ߻¡±µÄÃ÷È·Ö¤¾Ý¡£¡£¡£¡£ÊӲ췢Ã÷ £¬£¬£¬£¬£¬£¬£¬ÊÜѬȾÇéÐα£´æ¿ÉÒɵÄFortiGate SSL VPN»á¼û¼Í¼ £¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸öλÓÚ¶íÂÞ˹µÄÔ´IPµØµã £¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆäËûµØÇøÒ²·¢Ã÷ÁË¿ÉÒÉ»ù´¡ÉèÊ©¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/