WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ
Ðû²¼Ê±¼ä 2026-04-241. WordPress Breeze CacheÑÏÖØÎó²îÔâºÚ¿ÍʹÓÃ
4ÔÂ23ÈÕ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃWordPress Breeze Cache»º´æ²å¼þÖеÄÒ»¸öÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÏòЧÀÍÆ÷ÉÏ´«í§ÒâÎļþ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-3844£¬£¬£¬£¬ÑÏÖØÐÔÆÀ·ÖΪ9.8·Ö£¨Âú·Ö10·Ö£©¡£¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾WordfenceÒѼì²âµ½Áè¼Ý170´ÎÕë¶Ô¸ÃÎó²îµÄÏÖʵ¹¥»÷ʵÑ飬£¬£¬£¬Åú×¢ÆäÒѱ»ºÚ¿ÍÔÚÕæÊµÍøÂçÇéÐÎÖдó¹æÄ£Ê¹Óᣡ£¡£¡£¡£¡£¡£Breeze Cache²å¼þÓÉCloudways¿ª·¢£¬£¬£¬£¬»îÔ¾×°ÖÃÁ¿Áè¼Ý40Íò¸ö¡£¡£¡£¡£¡£¡£¡£¸Ã²å¼þµÄÖ÷Òª¹¦Ð§ÊÇͨ¹ý»º´æ¡¢ÎļþÓÅ»¯ºÍÊý¾Ý¿âÕûÀíÀ´Ìá¸ßÍøÕ¾ÐÔÄܺͼÓÔØËÙÂÊ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Hung Nguyen·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬ÆäȪԴÔÚÓÚ²å¼þÖС°fetch_gravatar_from_remote¡±º¯ÊýȱÉÙ¶ÔÉÏ´«ÎļþµÄÀàÐÍÑéÖ¤£¬£¬£¬£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòЧÀÍÆ÷ÉÏ´«í§Òâ¶ñÒâÎļþ£¬£¬£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´Ðв¢ÍêÈ«½ÓÊÜÄ¿µÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£CVE-2026-3844Ó°ÏìBreeze CacheµÄËùÓа汾£¬£¬£¬£¬°üÀ¨2.4.4¼°¸üÔç°æ±¾¡£¡£¡£¡£¡£¡£¡£CloudwaysÒÑÔÚ±¾ÖÜÔçЩʱ¼äÐû²¼ÁË2.4.5°æ±¾£¬£¬£¬£¬ÐÞ¸´ÁËÕâÒ»Çå¾²Îó²î¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/
2. Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
4ÔÂ23ÈÕ£¬£¬£¬£¬Bitwarden CLIµÄnpm·Ö·¢ÇþµÀÔøÒ»¶È±»¹¥ÆÆ£¬£¬£¬£¬¹¥»÷Õß½«¶ñÒâ°æ±¾µÄ@bitwarden/cli°ü£¨°æ±¾2026.4.0£©ÉÏ´«ÖÁnpm¿ÍÕ»£¬£¬£¬£¬¸Ã°ü°üÀ¨Ò»¸öÄܹ»ÇÔȡƾ֤²¢×ÔÎÒÈö²¥µÄÓÐÓÃÔØºÉ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâ°æ±¾ÓÚ2026Äê4ÔÂ22ÈÕÃÀ¹ú¶«²¿Ê±¼äÏÂÖç5:57ÖÁÍíÉÏ7:30ʱ´ú¿É¹©ÏÂÔØ£¬£¬£¬£¬Ëæºó±»É¾³ý¡£¡£¡£¡£¡£¡£¡£Bitwarden֤ʵÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬²¢ÌåÏÖй¶½öÓ°ÏìÁËCLIµÄnpm·Ö·¢ÇþµÀ£¬£¬£¬£¬ÇÒ½öÏÞÓÚÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìδ·¢Ã÷ÈκÎÖ¤¾ÝÅú×¢×îÖÕÓû§´æ´¢¿âÊý¾Ý¡¢Éú²úÊý¾Ý»òÉú²úϵͳÔâµ½ÆÆË𡣡£¡£¡£¡£¡£¡£Ò»µ©·¢Ã÷ÎÊÌ⣬£¬£¬£¬BitwardenÁ¬Ã¦×÷·ÏÁ˱»µÁÓõĻá¼ûȨÏÞ£¬£¬£¬£¬ÆúÓÃÁ˶ñÒânpm°æ±¾£¬£¬£¬£¬²¢Æô¶¯Á˵÷½â²½·¥¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÄܹ»ÍøÂçÊܺ¦ÏµÍ³ÖеÄnpmÁîÅÆ¡¢GitHubÈÏÖ¤ÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°AWS¡¢AzureºÍGoogle CloudµÄÔÆÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»¹¾ßÓÐ×ÔÎÒÈö²¥ÄÜÁ¦£¬£¬£¬£¬ËüÄܹ»Ê¹ÓÃÇÔÈ¡µÄnpmƾ֤ʶ±ðÊܺ¦ÕßÓÐȨÐ޸ĵÄÈí¼þ°ü£¬£¬£¬£¬²¢½«¶ñÒâ´úÂë×¢ÈëÆäÖС£¡£¡£¡£¡£¡£¡£Socket»¹ÊӲ쵽ÓÐÓÃÔØºÉÕë¶ÔCI/CDÇéÐΣ¬£¬£¬£¬ÊÔÍ¼ÍøÂç¿ÉÓÃÓÚÀ©Õ¹¹¥»÷µÄÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/
3. TrigonaÀÕË÷Èí¼þÆôÓö¨ÖÆÊý¾ÝÇÔÈ¡¹¤¾ß
4ÔÂ23ÈÕ£¬£¬£¬£¬½üÆÚ·¢Ã÷µÄTrigonaÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËÒ»¿îÃûΪ¡°uploader_client.exe¡±µÄ×Ô½ç˵ÏÂÁîÐй¤¾ßÀ´ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Õâ¿î¶¨Öƹ¤¾ßÄܹ»¸ü¿ì¡¢¸ü¸ßЧµØ´ÓÊÜѬȾÇéÐÎÖÐÇÔÈ¡Êý¾Ý£¬£¬£¬£¬Í¬Ê±¹æ±ÜÇå¾²½â¾ö¼Æ»®µÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£ÈüÃÅÌú¿ËÑо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬¹¥»÷ÕßתÏòʹÓö¨Öƹ¤¾ß£¬£¬£¬£¬Åú×¢ËûÃÇÕýÔÚͶÈëʱ¼äºÍ¾«Éñ¿ª·¢×¨ÓжñÒâÈí¼þ£¬£¬£¬£¬ÒÔÆÚÔÚ¹¥»÷µÄÒªº¦½×¶Î¼á³Ö½ÏµÍµÄ¿É¼û¶È£¬£¬£¬£¬´Ó¶ø×èֹʹÓÃRcloneºÍMegaSyncµÈ¹ûÕæ¹¤¾ß£¬£¬£¬£¬ÕâЩ¹¤¾ßͨ³£»£»£»£»á´¥·¢Çå¾²¾¯±¨¡£¡£¡£¡£¡£¡£¡£¸Ã¶¨Öƹ¤¾ßÅþÁ¬µ½Ò»¸öÓ²±àÂëµÄЧÀÍÆ÷µØµã£¬£¬£¬£¬ÔÚÐÔÄÜÓë¹æ±ÜÄÜÁ¦ÉÏ×öÁ˶àÏîÓÅ»¯£ºÖ§³Öÿ¸öÎļþͬʱ½¨ÉèÎå¸öÅþÁ¬£¬£¬£¬£¬Í¨¹ý²¢ÐÐÉÏ´«ÊµÏÖ¸ü¿ìµÄÊý¾Ýй¶£»£»£»£»Ã¿´«Êä2GBÁ÷Á¿ºóÂÖ»»TCPÅþÁ¬£¬£¬£¬£¬ÒÔ¹æ±ÜÍøÂç¼à¿Ø£»£»£»£»¿ÉÑ¡ÔñÐÔµØÉ¸Ñ¡ÎļþÀàÐÍ£¬£¬£¬£¬É¨³ý´óÐÍ¡¢µÍ¼ÛÖµµÄýÌåÎļþ£»£»£»£»Ê¹ÓÃÉí·ÝÑéÖ¤ÃÜÔ¿ÏÞÖÆÍⲿְԱ¶Ô±»ÇÔÊý¾ÝµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£ÔÚÒ»´ÎÒѼͼµÄ¹¥»÷ÊÂÎñÖУ¬£¬£¬£¬¸Ã¹¤¾ß±»ÓÃÀ´ÇÔÈ¡ÍøÂçÇý¶¯Æ÷Éϵĸ߼ÛÖµÎĵµ£¬£¬£¬£¬ÀýÈ緢ƱºÍPDFÎļþ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/
4. UNC6692½èTeamsÌᳫÉç½»¹¤³Ì¹¥»÷
4ÔÂ23ÈÕ£¬£¬£¬£¬´Ëǰδ¼Í¼ÔÚ°¸µÄÍþв»î¶¯¼¯ÈºUNC6692±»·¢Ã÷ʹÓÃMicrosoft Teams¾ÙÐÐÉç½»¹¤³Ì¹¥»÷£¬£¬£¬£¬ÔÚÊÜѬȾµÄÖ÷»úÉϰ²ÅÅÃûΪSNOWµÄ¶¨ÖÆÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÌ×¼þ¡£¡£¡£¡£¡£¡£¡£Óë½üÄêÀ´Ðí¶àÆäËûÈëÇÖÊÂÎñÀàËÆ£¬£¬£¬£¬UNC6692ÑÏÖØÒÀÀµÃ°³äITЧÀĮ́Ա¹¤£¬£¬£¬£¬ÓÕÆÊܺ¦Õß½ÓÊÜÀ´×ÔÆä×éÖ¯ÍⲿÕË»§µÄMicrosoft Teams̸ÌìÔ¼Çë¡£¡£¡£¡£¡£¡£¡£¸Ã¼¯ÈºÒѱ»Ö¤ÊµÓëÒ»³¡´ó¹æÄ£µç×ÓÓʼþºäÕ¨»î¶¯Óйأ¬£¬£¬£¬¹¥»÷ÕßÊ×ÏÈͨ¹ý´ó×ÚÀ¬»øÓʼþÑÍûĿµÄÓû§µÄÊÕ¼þÏäÖÆÔìÐéα½ôÆÈ¸Ð£¬£¬£¬£¬Ëæºóͨ¹ýTeamsð³äITÖ§³ÖÍŶӣ¬£¬£¬£¬Éù³Æ¿ÉÐÖú½â¾öÓʼþÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ReliaQuest±¨¸æÏÔʾ£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓôËÒªÁìÕë¶ÔÆóÒµ¸ß¹ÜºÍ¸ß¼¶Ô±¹¤ÒÔ»ñÈ¡ÆóÒµÍøÂç³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬½ø¶ø¾ÙÐÐÊý¾ÝÇÔÈ¡¡¢ºáÏòÒÆ¶¯¡¢ÀÕË÷Èí¼þ°²ÅźÍÚ²ÆÀÕË÷¡£¡£¡£¡£¡£¡£¡£UNC6692ÔÚ»ñµÃ³õʼ»á¼ûºó»¹Ö´ÐÐÁ˺áÏòÒÆ¶¯£¨É¨Ãè135/445/3389¶Ë¿Ú£©¡¢Í¨¹ýPsExec½¨Éè»á»°¡¢Ê¹ÓÃWMTÌáÈ¡LSASSÀú³ÌÄÚ´æ¾ÙÐÐȨÏÞÌáÉý£¬£¬£¬£¬ÒÔ¼°Ê¹ÓÃPass-The-HashÊÖÒÕºáÏòÒÆ¶¯µ½Óò¿ØÖÆÆ÷£¬£¬£¬£¬ÏÂÔØFTK Imager²¶»ñActive DirectoryÊý¾Ý²¢Í¨¹ýLimeWireй¶¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
5. Checkmarx KICS Docker¾µÏñÓëVSCodeÀ©Õ¹ÔâÈëÇÖ
4ÔÂ23ÈÕ£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËCheckmarx KICSÆÊÎö¹¤¾ßµÄDocker¾µÏñ¡¢VSCodeºÍOpen VSXÀ©Õ¹£¬£¬£¬£¬Ö¼ÔÚ´Ó¿ª·¢Ö°Ô±ÇéÐÎÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£SocketÔÚÊÕµ½Docker¹ØÓÚ¶ñÒâ¾µÏñ±»ÍÆË͵½¹Ù·½checkmarx/kics Docker Hub¿ÍÕ»µÄ¾¯±¨ºóÕö¿ªÊӲ죬£¬£¬£¬·¢Ã÷´Ë´ÎÈëÇÖ²»µ«ÏÞÓÚ±»Ö²ÈëľÂíµÄDocker¾µÏñ£¬£¬£¬£¬»¹²¨¼°VSCodeºÍOpen VSXÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£ÕâЩÀ©Õ¹ÏÂÔØÁËÒ»¸öÒþ²ØµÄ¡°MCP²å¼þ¡±¹¦Ð§£¬£¬£¬£¬¸Ã¹¦Ð§ÓÃÓÚ»ñÈ¡ÇÔÈ¡ÉñÃØµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Socket·¢Ã÷£¬£¬£¬£¬¡°MCP²å¼þ¡±¹¦Ð§ÊÇ´ÓÓ²±àÂëµÄGitHub URLÏÂÔØµÄ¡°¶à½×¶Îƾ֤ÇÔÈ¡ºÍÈö²¥×é¼þ¡±£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þרÃÅÕë¶ÔKICS´¦Öóͷ£µÄÊý¾Ý£¬£¬£¬£¬°üÀ¨GitHubÁîÅÆ¡¢ÔÆÆ¾Ö¤¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿¡¢ClaudeÉèÖúÍÇéÐαäÁ¿¡£¡£¡£¡£¡£¡£¡£ÐèÒª×¢ÖØµÄÊÇ£¬£¬£¬£¬Docker±êÇ©±»ÔÝÊ±ÖØ¶¨Ïòµ½Ò»¸ö¶ñÒâÕªÒª£¬£¬£¬£¬Òò´ËÓ°ÏìÈ¡¾öÓÚ¾µÏñ±»ÀÈ¡µÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£TeamPCPºÚ¿Í¹ûÕæÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£CheckmarxÒÑÐû²¼Ç徲ͨ¸æ£¬£¬£¬£¬È·ÈÏËùÓжñÒâ³ÌÐòÒÑɾ³ý£¬£¬£¬£¬Ð¹Â¶µÄƾ֤Òѱ»×÷·Ï²¢ÂÖ»»£¬£¬£¬£¬ÏÖÔÚÕýÓëÍⲿר¼ÒÏàÖúÊӲ졣¡£¡£¡£¡£¡£¡£½¨ÒéÊÜÓ°ÏìÓû§×èÖ¹»á¼ûÌØ¶¨¶ñÒâÓòÃû£¬£¬£¬£¬Ê¹ÓÃÀο¿SHAÖµ£¬£¬£¬£¬»Ö¸´µ½ÒÑÖªÇå¾²°æ±¾¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/
6. CISA½ôÆÈ±Þ²ßÕþ¸®»ú¹¹ÐÞ²¹DefenderÁãÈÕÎó²î
4ÔÂ23ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÒÑÏÂÁîÁª°î»ú¹¹ÔÚÁ½ÖÜÄÚ½ÓÄɲ½·¥£¬£¬£¬£¬±£»£»£»£»¤ÆäWindowsϵͳÃâÊÜÒ»¸öÒѱ»ÓÃÓÚÁãÈÕ¹¥»÷µÄMicrosoft DefenderȨÏÞÌáÉýÎó²îµÄË𺦡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2026-33825£¬£¬£¬£¬´úºÅ¡°BlueHammer¡±£¬£¬£¬£¬ÊôÓÚ¸ßΣ¼¶±ð¡£¡£¡£¡£¡£¡£¡£ËüÔÊÐíµÍȨÏÞµÄÍâµØÍþвÐÐΪÕßʹÓûá¼û¿ØÖÆÁ£¶ÉÏ꾡µÄÈõµã£¬£¬£¬£¬ÔÚδ´ò²¹¶¡µÄ×°±¸ÉÏ»ñµÃSYSTEM×î¸ßȨÏÞ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÓÚ4ÔÂ14ÈÕÔÚ¡°²¹¶¡ÐÇÆÚ¶þ¡±»î¶¯ÖÐÐÞ¸´Á˸ÃÎó²î¡£¡£¡£¡£¡£¡£¡£´ËǰһÖÜ£¬£¬£¬£¬Çå¾²Ñо¿Ô±¡°Chaotic Eclipse¡±Îª¿¹Òé΢ÈíÇå¾²ÏìÓ¦ÖÐÐÄ£¨MSRC£©µÄÎó²îÅû¶Á÷³Ì£¬£¬£¬£¬²»µ«½«Îó²îÃüÃûΪBlueHammer£¬£¬£¬£¬»¹¹ûÕæÐû²¼ÁË¿´·¨Ñé֤ʹÓôúÂë¡£¡£¡£¡£¡£¡£¡£¸üΪÑÏËàµÄÊÇ£¬£¬£¬£¬Huntress LabsÇå¾²Ñо¿Ö°Ô±ÓÚ4ÔÂ16ÈÕÅû¶£¬£¬£¬£¬ÒÑÓй¥»÷ÕßʹÓÃÕâЩÁãÈÕÎó²î·¢¶¯ÏÖʵ¹¥»÷£¬£¬£¬£¬ÇÒÏÔʾ³ö¡°ÏÖʵ²Ù×÷¼üÅ̵ÄÍþвÐÐΪÕ߻¡±µÄÃ÷È·Ö¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬ÊÜѬȾÇéÐα£´æ¿ÉÒɵÄFortiGate SSL VPN»á¼û¼Í¼£¬£¬£¬£¬°üÀ¨Ò»¸öλÓÚ¶íÂÞ˹µÄÔ´IPµØµã£¬£¬£¬£¬²¢ÔÚÆäËûµØÇøÒ²·¢Ã÷ÁË¿ÉÒÉ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ