Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ

Ðû²¼Ê±¼ä 2026-01-19

1. Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ


1ÔÂ15ÈÕ £¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶ £¬£¬£¬£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾±£´æÑÏÖØÎó²îCVE-2026-23550 £¬£¬£¬£¬¸ÃÎó²îÒѱ»ºÚ¿ÍʹÓà £¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤ £¬£¬£¬£¬ÒÔÖÎÀíԱȨÏÞ»á¼ûÊÜÓ°ÏìÍøÕ¾¡£¡£¡£¡£¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß £¬£¬£¬£¬×°ÖÃÁ¿Òѳ¬4Íò´Î £¬£¬£¬£¬Æä¹¦Ð§°üÀ¨Ô¶³Ì¼à¿Ø¡¢Ö´ÐиüС¢Óû§ÖÎÀí¡¢Ð§ÀÍÆ÷ÐÅÏ¢»á¼û¼°Î¬»¤Ê¹ÃüµÈ¡£¡£¡£¡£¡£¾ÝPatchstackÍŶӱ¨¸æ £¬£¬£¬£¬Îó²îÊ״ι¥»÷±¬·¢ÔÚ2026Äê1ÔÂ13ÈÕUTCʱ¼ä02:00×óÓÒ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ £¬£¬£¬£¬Îó²îÔ´ÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÇëÇó"ģʽʱ £¬£¬£¬£¬Î´¶ÔÇëÇóȪԴ¾ÙÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ £¬£¬£¬£¬µ¼ÖÂÃô¸Ð·ÓÉ̻¶²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÖÆ¡£¡£¡£¡£¡£Ïêϸ¶øÑÔ £¬£¬£¬£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLoginÒªÁìÖÐ £¬£¬£¬£¬´úÂëʵÑé´ÓÇëÇóÌå¶ÁÈ¡Óû§ID £¬£¬£¬£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼ £¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉʹÓôË·¾¶ÊµÏÖȨÏÞÌáÉý¡£¡£¡£¡£¡£Modular DSÔÚÊÕµ½Îó²î±¨¸æºóÊýСʱÄÚÐû²¼2.5.2°æ±¾ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/


2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß


1ÔÂ15ÈÕ £¬£¬£¬£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄ¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ £¬£¬£¬£¬Ó°Ïì145,381Ãû»¼Õß¡£¡£¡£¡£¡£¸Ã·ÇÓªÀûÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£»£»£»£»£»£»£»î¶¯ £¬£¬£¬£¬Ëæ¼´Æô¶¯Çå¾²¼Ó¹Ì²¢ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊÓ²ì £¬£¬£¬£¬Í¬²½×ª´ïÖ´·¨²¿·Ö¡£¡£¡£¡£¡£ÊÓ²ìÓÚ11ÔÂ6ÈÕÍê³É £¬£¬£¬£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕʱ´ú £¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäITÇéÐÎ £¬£¬£¬£¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÖÎÁÆÏêÇ顢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢°ü¹ÜÐÅÏ¢ £¬£¬£¬£¬²¿·Ö²¡Àý»¹Éæ¼°Éç»á°ü¹ÜºÅÂë¡£¡£¡£¡£¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÇøÒªº¦Ò½ÁÆÐ§ÀÍÉÌ £¬£¬£¬£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢ÕïËù¼°×¨¿ÆÐ§ÀÍ £¬£¬£¬£¬ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£»£»£»£»£»£»£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕʱ´úͨ¹ýÊéÃæÍ¨Öª¡¢ÈÈÏߵ绰¼°ÍøÕ¾Í¨¸æ¼û¸æÊÜÓ°Ï컼Õß £¬£¬£¬£¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓñ£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¸ÃЧÀÍÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±£ £¬£¬£¬£¬º­¸Çµ¥¾ÖÐÅÓÃ¼à¿Ø¡¢ÊµÊ±ÐÅÓñ¨¸æ¡¢ÐÅÓÃÆÀ·Ö±ä»»ÌáÐѼ°×Ô¶¯Ú²Æ­Ô®Öú £¬£¬£¬£¬Ð­ÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ¡£¡£¡£¡£¡£


https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html


3. WhisperPairÎó²î̻¶ÊýÒÚÀ¶ÑÀ×°±¸Ç徲Σº¦


1ÔÂ15ÈÕ £¬£¬£¬£¬Â³ãë´óѧÅÌËã»úÇå¾²ÍŶӷ¢Ã÷¹È¸è¿ìËÙÅä¶ÔЭÒé±£´æ¸ßΣÎó²îCVE-2025-36911£¨´úºÅWhisperPair£© £¬£¬£¬£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸Ã¹¦Ð§µÄÎÞÏß¶ú»ú¡¢¶úÈûºÍÑïÉùÆ÷ £¬£¬£¬£¬Éæ¼°Google¡¢Jabra¡¢JBL¡¢Ë÷ÄᡢСÃ×µÈÊ®Óà¸öÆ·ÅÆ¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ×°±¸ÖÆÔìÉ̶ԿìËÙÅä¶ÔЭÒéµÄ²»µ±ÊµÏÖ £¬£¬£¬£¬¹æ·¶ÒªÇó×°±¸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÇëÇó £¬£¬£¬£¬µ«´ó¶¼³§ÉÌÎ´Ç¿ÖÆÖ´Ðд˼ì²é £¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éδ¾­Óû§ÊÚÈ¨Ç¿ÖÆÅä¶Ô×°±¸¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÈκÎÀ¶ÑÀ×°±¸£¨ÈçÌõ¼Ç±¾µçÄÔ¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£© £¬£¬£¬£¬ÔÚ14Ã×¹æÄ£ÄÚÎÞÐèÓû§½»»¥¼´¿ÉÍê³ÉÅä¶Ô¡£¡£¡£¡£¡£Åä¶Ôºó £¬£¬£¬£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÒôƵװ±¸£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§ £¬£¬£¬£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»°¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ £¬£¬£¬£¬Í¨¹ýGoogleµÄFind HubÍøÂç £¬£¬£¬£¬¹¥»÷Õ߿ɽ«Êܺ¦Õß×°±¸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§ £¬£¬£¬£¬ÊµÏÖ¿ç×°±¸Î»Öøú×Ù¡£¡£¡£¡£¡£Êܺ¦Õß¿ÉÄÜÊÕµ½×°±¸×Ô´øµÄ¸ú×Ù֪ͨ £¬£¬£¬£¬µ«ÒòÏÔʾΪ×ÔÉí×°±¸¶øºöÊÓÖÒÑÔ £¬£¬£¬£¬µ¼Öºã¾ÃÒþ²Ø¸ú×Ù¡£¡£¡£¡£¡£¹È¸èÏòÑо¿Ö°Ô±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𠣬£¬£¬£¬²¢Óë³§ÉÌÏàÖúÔÚ150ÌìÅû¶ÆÚÄÚÐû²¼²¹¶¡¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/


4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß


1ÔÂ18ÈÕ £¬£¬£¬£¬¼ÓÄôóͶ×Êî¿Ïµ×éÖ¯£¨CIRO£©¿ËÈÕ֤ʵ £¬£¬£¬£¬È¥Äê8ÔÂÔâÓöµÄÍøÂçÇå¾²ÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕß £¬£¬£¬£¬³ÉΪ¸Ã¹úÈ¥Äê×îÑÏÖØµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£CIRO×÷Ϊ2023Ä꽨ÉèµÄ¼ÓÄôóͶ×ÊÉúÒâÉÌ¡¢ÅäºÏ»ù½ðÉúÒâÉ̼°ÉúÒâ»î¶¯µÄ¹ú¼Ò×ÔÂÉ»ú¹¹ £¬£¬£¬£¬ÊǽðÈÚî¿Ïµ¿ò¼ÜµÄ½¹µãÖ§ÖùÖ®Ò»¡£¡£¡£¡£¡£CIRO·¢Ã÷ϵͳ±£´æÍøÂçÇå¾²Íþвºó £¬£¬£¬£¬Á¬Ã¦¹Ø±Õ²¿·Ö·ÇÒªº¦ÏµÍ³²¢Æô¶¯ÊӲ졣¡£¡£¡£¡£Ö»¹Ü8ÔÂ18ÈÕ¶ÔÍâÅû¶ÊÂÎñ £¬£¬£¬£¬µ«ÍêÕûÓ°Ïì¹æÄ£Ö±ÖÁ½ñÄê1ÔÂ14ÈÕÍê³ÉÆÕ±é·¨Ö¤ÊÓ²ìºó²ÅµÃÒÔÃ÷È·¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ £¬£¬£¬£¬²¿·Ö³ÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Ôâй¶ £¬£¬£¬£¬ÏêϸÊý¾ÝÒòÈ˶øÒì £¬£¬£¬£¬¿ÉÄܰüÀ¨³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÄêÊÕÈë¡¢Éç»á°ü¹ÜºÅÂë¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅÂ롢Ͷ×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§Çå¾²ÎÊÌâ £¬£¬£¬£¬Òò´ËÕâЩÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£Îª½µµÍΣº¦ £¬£¬£¬£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ £¬£¬£¬£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý £¬£¬£¬£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/


5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©Õ¹³ÌÐò×°ÖÃÁ¿´ï84Íò´Î


1ÔÂ17ÈÕ £¬£¬£¬£¬¿ËÈÕ £¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚChrome¡¢FirefoxºÍEdgeÓ¦ÓÃÊÐËÁÖз¢Ã÷17¸öÓëGhostPoster¹¥»÷»î¶¯Ïà¹ØµÄ¶ñÒâä¯ÀÀÆ÷À©Õ¹³ÌÐò £¬£¬£¬£¬×Ü×°ÖÃÁ¿´ï84Íò´Î¡£¡£¡£¡£¡£¸Ã»î¶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶ £¬£¬£¬£¬Éæ¼°À©Õ¹Í¨¹ýͼ±êÒþ²Ø¶ñÒâJavaScript´úÂë £¬£¬£¬£¬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯²¢Ö²ÈëºóÃÅ¡£¡£¡£¡£¡£ÕâЩ´úÂë»á´ÓÍⲿ»ñÈ¡»ìÏýµÄÓÐÓÃÔØºÉ £¬£¬£¬£¬¸ú×Ùä¯ÀÀÐÐΪ £¬£¬£¬£¬Ð®ÖƵçÉÌÆ½Ì¨Í¬ÃËÁ´½Ó £¬£¬£¬£¬²¢×¢Èë²»¿É¼ûiframeʵÑé¹ã¸æÚ²Æ­ºÍµã»÷ڲƭ¡£¡£¡£¡£¡£LayerXµÄ×îб¨¸æÖ¸³ö £¬£¬£¬£¬Ö»¹Ü»î¶¯ÒÑÆØ¹â £¬£¬£¬£¬µ«ÈÔÒ»Á¬»îÔ¾¡£¡£¡£¡£¡£17¸öÀ©Õ¹ÖÐ £¬£¬£¬£¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·­Òë"´ï52.2Íò´Î £¬£¬£¬£¬"ʹÓÃGoogle·­ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î £¬£¬£¬£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ¡£¡£¡£¡£¡£»£»£»£»£»£»£»î¶¯×î³õÔÚMicrosoft Edgeƽ̨Ìᳫ £¬£¬£¬£¬ºóÀ©Õ¹ÖÁFirefoxºÍChrome £¬£¬£¬£¬²¿·ÖÀ©Õ¹×Ô2020ÄêÆð±ã±£´æÓÚ²å¼þÊÐËÁ £¬£¬£¬£¬ÏÔʾÆäºã¾ÃÔËÓªµÄÀÖ³ÉÐÔ¡£¡£¡£¡£¡£ÏÖÔÚ £¬£¬£¬£¬MozillaºÍ΢ÈíÒѽ«Ïà¹ØÀ©Õ¹ÏÂ¼Ü £¬£¬£¬£¬¹È¸èҲȷÈÏChromeÊÐËÁÖеÄÕâЩÀ©Õ¹Òѱ»É¾³ý¡£¡£¡£¡£¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæÁÙΣº¦ £¬£¬£¬£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/


6. Fortinet FortiSIEM¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ


1ÔÂ16ÈÕ £¬£¬£¬£¬¿ËÈÕ £¬£¬£¬£¬Fortinet FortiSIEM±»ÆØ±£´æÑÏÖØÎó²î£¨CVE-2025-64155£© £¬£¬£¬£¬Æä¿´·¨Ñé֤ʹÓôúÂëÒѹûÕæ £¬£¬£¬£¬ÇÒÕý±»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¡£¡£¸ÃÎó²îÓÉHorizon3.aiÇå¾²Ñо¿Ô±Zach Hanley·¢Ã÷ £¬£¬£¬£¬ÊµÖÊÊDzÙ×÷ϵͳÏÂÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ £¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýÈ«ÐĽṹµÄTCPÇëÇóÖ´ÐÐí§Òâ´úÂë £¬£¬£¬£¬×îÖÕ¿É»ñÈ¡root»á¼ûȨÏÞ¡£¡£¡£¡£¡£Îó²îÓ°ÏìFortiSIEM 6.7ÖÁ7.5°æ±¾ £¬£¬£¬£¬FortinetÒÑÐû²¼Çå¾²¸üР£¬£¬£¬£¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢7.3.5¼°ÒÔÉÏ¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£»£»£»£»£»£»£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁÐÞ¸´°æ±¾¡£¡£¡£¡£¡£ÔÝʱ½â¾ö¼Æ»®ÎªÏÞÖÆphMonitorЧÀͶ˿ڣ¨7900£©µÄ»á¼û £¬£¬£¬£¬ÒÔ»º½âÎÞ·¨Á¬Ã¦Éý¼¶µÄÇéÐΡ£¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ £¬£¬£¬£¬Îó²îȪԴÔÚÓÚphMonitorЧÀÍ̻¶µÄÊýÊ®¸öδÂÄÀúÖ¤µÄÔ¶³Ì¿ÉŲÓÃÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢ÈëÁýÕÖ/opt/charting/redishb.shÎļþ £¬£¬£¬£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë¡£¡£¡£¡£¡£Horizon3.aiÒÑÐû²¼ÊÖÒÕÎÄÕ¼°ÈëÇÖÖ¸±ê £¬£¬£¬£¬ÖÎÀíÔ±¿Éͨ¹ý¼ì²é/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾ £¬£¬£¬£¬²éÕÒ°üÀ¨PHL_ERRORÌõÄ¿ÖеĶñÒâÔØºÉURLÒÔʶ±ðÈëÇÖ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/