WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ
Ðû²¼Ê±¼ä 2026-04-241. WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃWordPress Breeze Cache»º´æ²å¼þÖеÄÒ»¸öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÏòЧÀÍÆ÷ÉÏ´«í§ÒâÎļþ¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-3844£¬£¬£¬£¬£¬£¬£¬ÑÏÖØÐÔÆÀ·ÖΪ9.8·Ö£¨Âú·Ö10·Ö£©¡£¡£¡£¡£Çå¾²¹«Ë¾WordfenceÒѼì²âµ½Áè¼Ý170´ÎÕë¶Ô¸ÃÎó²îµÄÏÖʵ¹¥»÷ʵÑ飬£¬£¬£¬£¬£¬£¬Åú×¢ÆäÒѱ»ºÚ¿ÍÔÚÕæÊµÍøÂçÇéÐÎÖдó¹æÄ£Ê¹Óᣡ£¡£¡£Breeze Cache²å¼þÓÉCloudways¿ª·¢£¬£¬£¬£¬£¬£¬£¬»îÔ¾×°ÖÃÁ¿Áè¼Ý40Íò¸ö¡£¡£¡£¡£¸Ã²å¼þµÄÖ÷Òª¹¦Ð§ÊÇͨ¹ý»º´æ¡¢ÎļþÓÅ»¯ºÍÊý¾Ý¿âÕûÀíÀ´Ìá¸ßÍøÕ¾ÐÔÄܺͼÓÔØËÙÂÊ¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Hung Nguyen·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÆäȪԴÔÚÓÚ²å¼þÖС°fetch_gravatar_from_remote¡±º¯ÊýȱÉÙ¶ÔÉÏ´«ÎļþµÄÀàÐÍÑéÖ¤£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòЧÀÍÆ÷ÉÏ´«í§Òâ¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´Ðв¢ÍêÈ«½ÓÊÜÄ¿µÄÍøÕ¾¡£¡£¡£¡£CVE-2026-3844Ó°ÏìBreeze CacheµÄËùÓа汾£¬£¬£¬£¬£¬£¬£¬°üÀ¨2.4.4¼°¸üÔç°æ±¾¡£¡£¡£¡£CloudwaysÒÑÔÚ±¾ÖÜÔçЩʱ¼äÐû²¼ÁË2.4.5°æ±¾£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÕâÒ»Çå¾²Îó²î¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/
2. Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬Bitwarden CLIµÄnpm·Ö·¢ÇþµÀÔøÒ»¶È±»¹¥ÆÆ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«¶ñÒâ°æ±¾µÄ@bitwarden/cli°ü£¨°æ±¾2026.4.0£©ÉÏ´«ÖÁnpm¿ÍÕ»£¬£¬£¬£¬£¬£¬£¬¸Ã°ü°üÀ¨Ò»¸öÄܹ»ÇÔȡƾ֤²¢×ÔÎÒÈö²¥µÄÓÐÓÃÔØºÉ¡£¡£¡£¡£¸Ã¶ñÒâ°æ±¾ÓÚ2026Äê4ÔÂ22ÈÕÃÀ¹ú¶«²¿Ê±¼äÏÂÖç5:57ÖÁÍíÉÏ7:30ʱ´ú¿É¹©ÏÂÔØ£¬£¬£¬£¬£¬£¬£¬Ëæºó±»É¾³ý¡£¡£¡£¡£Bitwarden֤ʵÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖй¶½öÓ°ÏìÁËCLIµÄnpm·Ö·¢ÇþµÀ£¬£¬£¬£¬£¬£¬£¬ÇÒ½öÏÞÓÚÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§¡£¡£¡£¡£ÊÓ²ìδ·¢Ã÷ÈκÎÖ¤¾ÝÅú×¢×îÖÕÓû§´æ´¢¿âÊý¾Ý¡¢Éú²úÊý¾Ý»òÉú²úϵͳÔâµ½ÆÆË𡣡£¡£¡£Ò»µ©·¢Ã÷ÎÊÌ⣬£¬£¬£¬£¬£¬£¬BitwardenÁ¬Ã¦×÷·ÏÁ˱»µÁÓõĻá¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬ÆúÓÃÁ˶ñÒânpm°æ±¾£¬£¬£¬£¬£¬£¬£¬²¢Æô¶¯Á˵÷½â²½·¥¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçÊܺ¦ÏµÍ³ÖеÄnpmÁîÅÆ¡¢GitHubÈÏÖ¤ÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°AWS¡¢AzureºÍGoogle CloudµÄÔÆÆ¾Ö¤¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹¾ßÓÐ×ÔÎÒÈö²¥ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬ËüÄܹ»Ê¹ÓÃÇÔÈ¡µÄnpmƾ֤ʶ±ðÊܺ¦ÕßÓÐȨÐ޸ĵÄÈí¼þ°ü£¬£¬£¬£¬£¬£¬£¬²¢½«¶ñÒâ´úÂë×¢ÈëÆäÖС£¡£¡£¡£Socket»¹ÊӲ쵽ÓÐÓÃÔØºÉÕë¶ÔCI/CDÇéÐΣ¬£¬£¬£¬£¬£¬£¬ÊÔÍ¼ÍøÂç¿ÉÓÃÓÚÀ©Õ¹¹¥»÷µÄÃÜÔ¿¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/
3. TrigonaÀÕË÷Èí¼þÆôÓö¨ÖÆÊý¾ÝÇÔÈ¡¹¤¾ß
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ·¢Ã÷µÄTrigonaÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÒ»¿îÃûΪ¡°uploader_client.exe¡±µÄ×Ô½ç˵ÏÂÁîÐй¤¾ßÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£Õâ¿î¶¨Öƹ¤¾ßÄܹ»¸ü¿ì¡¢¸ü¸ßЧµØ´ÓÊÜѬȾÇéÐÎÖÐÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¹æ±ÜÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£ÈüÃÅÌú¿ËÑо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßתÏòʹÓö¨Öƹ¤¾ß£¬£¬£¬£¬£¬£¬£¬Åú×¢ËûÃÇÕýÔÚͶÈëʱ¼äºÍ¾«Éñ¿ª·¢×¨ÓжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÒÔÆÚÔÚ¹¥»÷µÄÒªº¦½×¶Î¼á³Ö½ÏµÍµÄ¿É¼û¶È£¬£¬£¬£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃRcloneºÍMegaSyncµÈ¹ûÕæ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÕâЩ¹¤¾ßͨ³£»£»£»£»á´¥·¢Çå¾²¾¯±¨¡£¡£¡£¡£¸Ã¶¨Öƹ¤¾ßÅþÁ¬µ½Ò»¸öÓ²±àÂëµÄЧÀÍÆ÷µØµã£¬£¬£¬£¬£¬£¬£¬ÔÚÐÔÄÜÓë¹æ±ÜÄÜÁ¦ÉÏ×öÁ˶àÏîÓÅ»¯£ºÖ§³Öÿ¸öÎļþͬʱ½¨ÉèÎå¸öÅþÁ¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý²¢ÐÐÉÏ´«ÊµÏÖ¸ü¿ìµÄÊý¾Ýй¶£»£»£»£»Ã¿´«Êä2GBÁ÷Á¿ºóÂÖ»»TCPÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¹æ±ÜÍøÂç¼à¿Ø£»£»£»£»¿ÉÑ¡ÔñÐÔµØÉ¸Ñ¡ÎļþÀàÐÍ£¬£¬£¬£¬£¬£¬£¬É¨³ý´óÐÍ¡¢µÍ¼ÛÖµµÄýÌåÎļþ£»£»£»£»Ê¹ÓÃÉí·ÝÑéÖ¤ÃÜÔ¿ÏÞÖÆÍⲿְԱ¶Ô±»ÇÔÊý¾ÝµÄ»á¼û¡£¡£¡£¡£ÔÚÒ»´ÎÒѼͼµÄ¹¥»÷ÊÂÎñÖУ¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß±»ÓÃÀ´ÇÔÈ¡ÍøÂçÇý¶¯Æ÷Éϵĸ߼ÛÖµÎĵµ£¬£¬£¬£¬£¬£¬£¬ÀýÈ緢ƱºÍPDFÎļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/
4. UNC6692½èTeamsÌᳫÉç½»¹¤³Ì¹¥»÷
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬´Ëǰδ¼Í¼ÔÚ°¸µÄÍþв»î¶¯¼¯ÈºUNC6692±»·¢Ã÷ʹÓÃMicrosoft Teams¾ÙÐÐÉç½»¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾµÄÖ÷»úÉϰ²ÅÅÃûΪSNOWµÄ¶¨ÖÆÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÌ×¼þ¡£¡£¡£¡£Óë½üÄêÀ´Ðí¶àÆäËûÈëÇÖÊÂÎñÀàËÆ£¬£¬£¬£¬£¬£¬£¬UNC6692ÑÏÖØÒÀÀµÃ°³äITЧÀĮ́Ա¹¤£¬£¬£¬£¬£¬£¬£¬ÓÕÆÊܺ¦Õß½ÓÊÜÀ´×ÔÆä×éÖ¯ÍⲿÕË»§µÄMicrosoft Teams̸ÌìÔ¼Çë¡£¡£¡£¡£¸Ã¼¯ÈºÒѱ»Ö¤ÊµÓëÒ»³¡´ó¹æÄ£µç×ÓÓʼþºäÕ¨»î¶¯Óйأ¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈͨ¹ý´ó×ÚÀ¬»øÓʼþÑÍûĿµÄÓû§µÄÊÕ¼þÏäÖÆÔìÐéα½ôÆÈ¸Ð£¬£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ýTeamsð³äITÖ§³ÖÍŶӣ¬£¬£¬£¬£¬£¬£¬Éù³Æ¿ÉÐÖú½â¾öÓʼþÎÊÌâ¡£¡£¡£¡£ReliaQuest±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓôËÒªÁìÕë¶ÔÆóÒµ¸ß¹ÜºÍ¸ß¼¶Ô±¹¤ÒÔ»ñÈ¡ÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬½ø¶ø¾ÙÐÐÊý¾ÝÇÔÈ¡¡¢ºáÏòÒÆ¶¯¡¢ÀÕË÷Èí¼þ°²ÅźÍÚ²ÆÀÕË÷¡£¡£¡£¡£UNC6692ÔÚ»ñµÃ³õʼ»á¼ûºó»¹Ö´ÐÐÁ˺áÏòÒÆ¶¯£¨É¨Ãè135/445/3389¶Ë¿Ú£©¡¢Í¨¹ýPsExec½¨Éè»á»°¡¢Ê¹ÓÃWMTÌáÈ¡LSASSÀú³ÌÄÚ´æ¾ÙÐÐȨÏÞÌáÉý£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃPass-The-HashÊÖÒÕºáÏòÒÆ¶¯µ½Óò¿ØÖÆÆ÷£¬£¬£¬£¬£¬£¬£¬ÏÂÔØFTK Imager²¶»ñActive DirectoryÊý¾Ý²¢Í¨¹ýLimeWireй¶¡£¡£¡£¡£
https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
5. Checkmarx KICS Docker¾µÏñÓëVSCodeÀ©Õ¹ÔâÈëÇÖ
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËCheckmarx KICSÆÊÎö¹¤¾ßµÄDocker¾µÏñ¡¢VSCodeºÍOpen VSXÀ©Õ¹£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ´Ó¿ª·¢Ö°Ô±ÇéÐÎÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£SocketÔÚÊÕµ½Docker¹ØÓÚ¶ñÒâ¾µÏñ±»ÍÆË͵½¹Ù·½checkmarx/kics Docker Hub¿ÍÕ»µÄ¾¯±¨ºóÕö¿ªÊӲ죬£¬£¬£¬£¬£¬£¬·¢Ã÷´Ë´ÎÈëÇÖ²»µ«ÏÞÓÚ±»Ö²ÈëľÂíµÄDocker¾µÏñ£¬£¬£¬£¬£¬£¬£¬»¹²¨¼°VSCodeºÍOpen VSXÀ©Õ¹¡£¡£¡£¡£ÕâЩÀ©Õ¹ÏÂÔØÁËÒ»¸öÒþ²ØµÄ¡°MCP²å¼þ¡±¹¦Ð§£¬£¬£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÓÃÓÚ»ñÈ¡ÇÔÈ¡ÉñÃØµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£Socket·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¡°MCP²å¼þ¡±¹¦Ð§ÊÇ´ÓÓ²±àÂëµÄGitHub URLÏÂÔØµÄ¡°¶à½×¶Îƾ֤ÇÔÈ¡ºÍÈö²¥×é¼þ¡±£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þרÃÅÕë¶ÔKICS´¦Öóͷ£µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨GitHubÁîÅÆ¡¢ÔÆÆ¾Ö¤¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿¡¢ClaudeÉèÖúÍÇéÐαäÁ¿¡£¡£¡£¡£ÐèÒª×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Docker±êÇ©±»ÔÝÊ±ÖØ¶¨Ïòµ½Ò»¸ö¶ñÒâÕªÒª£¬£¬£¬£¬£¬£¬£¬Òò´ËÓ°ÏìÈ¡¾öÓÚ¾µÏñ±»ÀÈ¡µÄʱ¼ä¡£¡£¡£¡£TeamPCPºÚ¿Í¹ûÕæÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£CheckmarxÒÑÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬È·ÈÏËùÓжñÒâ³ÌÐòÒÑɾ³ý£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄƾ֤Òѱ»×÷·Ï²¢ÂÖ»»£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëÍⲿר¼ÒÏàÖúÊӲ졣¡£¡£¡£½¨ÒéÊÜÓ°ÏìÓû§×èÖ¹»á¼ûÌØ¶¨¶ñÒâÓòÃû£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃÀο¿SHAÖµ£¬£¬£¬£¬£¬£¬£¬»Ö¸´µ½ÒÑÖªÇå¾²°æ±¾¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/
6. CISA½ôÆÈ±Þ²ßÕþ¸®»ú¹¹ÐÞ²¹DefenderÁãÈÕÎó²î
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÏÂÁîÁª°î»ú¹¹ÔÚÁ½ÖÜÄÚ½ÓÄɲ½·¥£¬£¬£¬£¬£¬£¬£¬±£»£»£»£»¤ÆäWindowsϵͳÃâÊÜÒ»¸öÒѱ»ÓÃÓÚÁãÈÕ¹¥»÷µÄMicrosoft DefenderȨÏÞÌáÉýÎó²îµÄË𺦡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-33825£¬£¬£¬£¬£¬£¬£¬´úºÅ¡°BlueHammer¡±£¬£¬£¬£¬£¬£¬£¬ÊôÓÚ¸ßΣ¼¶±ð¡£¡£¡£¡£ËüÔÊÐíµÍȨÏÞµÄÍâµØÍþвÐÐΪÕßʹÓûá¼û¿ØÖÆÁ£¶ÉÏ꾡µÄÈõµã£¬£¬£¬£¬£¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏ»ñµÃSYSTEM×î¸ßȨÏÞ¡£¡£¡£¡£Î¢ÈíÓÚ4ÔÂ14ÈÕÔÚ¡°²¹¶¡ÐÇÆÚ¶þ¡±»î¶¯ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£´ËǰһÖÜ£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±¡°Chaotic Eclipse¡±Îª¿¹Òé΢ÈíÇå¾²ÏìÓ¦ÖÐÐÄ£¨MSRC£©µÄÎó²îÅû¶Á÷³Ì£¬£¬£¬£¬£¬£¬£¬²»µ«½«Îó²îÃüÃûΪBlueHammer£¬£¬£¬£¬£¬£¬£¬»¹¹ûÕæÐû²¼ÁË¿´·¨Ñé֤ʹÓôúÂë¡£¡£¡£¡£¸üΪÑÏËàµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Huntress LabsÇå¾²Ñо¿Ö°Ô±ÓÚ4ÔÂ16ÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ÒÑÓй¥»÷ÕßʹÓÃÕâЩÁãÈÕÎó²î·¢¶¯ÏÖʵ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÇÒÏÔʾ³ö¡°ÏÖʵ²Ù×÷¼üÅ̵ÄÍþвÐÐΪÕ߻¡±µÄÃ÷È·Ö¤¾Ý¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬ÊÜѬȾÇéÐα£´æ¿ÉÒɵÄFortiGate SSL VPN»á¼û¼Í¼£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ò»¸öλÓÚ¶íÂÞ˹µÄÔ´IPµØµã£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆäËûµØÇøÒ²·¢Ã÷ÁË¿ÉÒÉ»ù´¡ÉèÊ©¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ