WordPress Breeze CacheÑÏÖØ·ì϶ÔâºÚ¿ÍÀûÓÃ
°ä²¼¹¦·ò 2026-04-241. WordPress Breeze CacheÑÏÖØ·ì϶ÔâºÚ¿ÍÀûÓÃ
4ÔÂ23ÈÕ£¬£¬ºÚ¿ÍÕýÔÚ»ý¼«ÀûÓÃWordPress Breeze Cache»º´æ²å¼þÖеÄÒ»¸öÑÏÖØ°²È«·ì϶£¬£¬¸Ã·ì϶ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÏò·þÎñÆ÷ÉÏ´«ËÁÒâÎļþ¡£¡£¸Ã·ì϶±»×·×ÙΪCVE-2026-3844£¬£¬ÑÏÖØÐÔÆÀ·ÖΪ9.8·Ö£¨Âú·Ö10·Ö£©¡£¡£°²È«¹«Ë¾WordfenceÒѼì²âµ½³¬¹ý170´ÎÕë¶Ô¸Ã·ì϶µÄÏÖʵ¹¥»÷³¢ÊÔ£¬£¬Åú×¢ÆäÒѱ»ºÚ¿ÍÔÚÕæÊµÍøÂç»·¾³Öдó¹æÄ£ÀûÓᣡ£Breeze Cache²å¼þÓÉCloudways¿ª·¢£¬£¬»îÔ¾×°ÖÃÁ¿³¬¹ý40Íò¸ö¡£¡£¸Ã²å¼þµÄÖØÒªÖ°ÄÜÊÇͨ¹ý»º´æ¡¢ÎļþÓÅ»¯ºÍÊý¾Ý¿âËãÕÊÀ´Ìá¸ßÍøÕ¾»úÄܺͼÓÔØËÙ¶È¡£¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Hung Nguyen·¢ÏÖ²¢»ã±¨£¬£¬Æä±¾ÔÔÚÓÚ²å¼þÖС°fetch_gravatar_from_remote¡±º¯Êý¶Ìȱ¶ÔÉÏ´«ÎļþµÄÀàÐÍÑéÖ¤£¬£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»Ïò·þÎñÆ÷ÉÏ´«ËÁÒâ¶ñÒâÎļþ£¬£¬½ø¶øÊµÏÖÔ¶³Ì´úÂëÖ´Ðв¢ÆëÈ«ÊÕÊÜÖ¸±êÍøÕ¾¡£¡£CVE-2026-3844Ó°ÏìBreeze CacheµÄËùÓа汾£¬£¬Ô̺¬2.4.4¼°¸üÔç°æ±¾¡£¡£CloudwaysÒÑÔÚ±¾ÖÜÔçЩʱ³½°ä²¼ÁË2.4.5°æ±¾£¬£¬ÐÞ¸´ÁËÕâÒ»°²È«·ì϶¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-file-upload-bug-in-breeze-cache-wordpress-plugin/
2. Bitwarden CLI npm°üÔ⹩¸øÁ´¹¥»÷
4ÔÂ23ÈÕ£¬£¬Bitwarden CLIµÄnpm·Ö·¢ÇþµÀÔøÒ»¶È±»¹¥ÆÆ£¬£¬¹¥»÷Õß½«¶ñÒâ°æ±¾µÄ@bitwarden/cli°ü£¨°æ±¾2026.4.0£©ÉÏ´«ÖÁnpm²Ö¿â£¬£¬¸Ã°üÔ̺¬Ò»¸ö¿ÉÄÜÇÔȡƾ֤²¢×ÔÎÒ´«²¼µÄÓÐÐ§ÔØºÉ¡£¡£¸Ã¶ñÒâ°æ±¾ÓÚ2026Äê4ÔÂ22ÈÕÃÀ¹ú¶«²¿¹¦·òÏÂÎç5:57ÖÁÍíÉÏ7:30ÆÚ¼ä¿É¹©ÏÂÔØ£¬£¬Ëæºó±»É¾³ý¡£¡£Bitwarden֤ʵÁËÕâ´ÎÊÂÎñ£¬£¬²¢°µÊ¾Ð¹Â¶½öÓ°ÏìÁËCLIµÄnpm·Ö·¢ÇþµÀ£¬£¬ÇÒ½öÏÞÓÚÏÂÔØÁ˶ñÒâ°æ±¾µÄÓû§¡£¡£µ÷²éδ·¢ÏÖÈκÎÖ¤¾ÝÅú×¢×îÖÕÓû§´æ´¢¿âÊý¾Ý¡¢³ö²úÊý¾Ý»ò³ö²úϵͳÔâµ½·ÛËé¡£¡£Ò»µ©·¢ÏÖÎÊÌ⣬£¬BitwardenÁ¢¼´³·ÏúÁ˱»µÁÓõĽӼûȨÏÞ£¬£¬ÆúÓÃÁ˶ñÒânpm°æ±¾£¬£¬²¢Æô¶¯Á˲¹¾È´ëÊ©¡£¡£¸Ã¶ñÒâÈí¼þ¿ÉÄÜÍøÂçÊܺ¦ÏµÍ³ÖеÄnpmÁîÅÆ¡¢GitHubÈÏÖ¤ÁîÅÆ¡¢SSHÃÜÔ¿ÒÔ¼°AWS¡¢AzureºÍGoogle CloudµÄÔÆÆ¾Ö¤¡£¡£¸Ã¶ñÒâÈí¼þ»¹ÓµÓÐ×ÔÎÒ´«²¼ÄÜÁ¦£¬£¬Ëü¿ÉÄÜÀûÓÃÇÔÈ¡µÄnpmÍ´´¦¼ø±ðÊܺ¦ÕßÓÐȨÅú¸ÄµÄÈí¼þ°ü£¬£¬²¢½«¶ñÒâ´úÂë×¢ÈëÆäÖС£¡£Socket»¹¹Û²ìµ½ÓÐÐ§ÔØºÉÕë¶ÔCI/CD»·¾³£¬£¬ÊÔÍ¼ÍøÂç¿ÉÓÃÓÚÀ©´ó¹¥»÷µÄÃÜÔ¿¡£¡£
https://www.bleepingcomputer.com/news/security/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/
3. TrigonaÀÕË÷Èí¼þÆôÓö¨ÖÆÊý¾ÝÇÔÈ¡¹¤¾ß
4ÔÂ23ÈÕ£¬£¬½üÆÚ·¢ÏÖµÄTrigonaÀÕË÷Èí¼þ¹¥»÷ÖУ¬£¬¹¥»÷ÕßʹÓÃÁËÒ»¿îÃûΪ¡°uploader_client.exe¡±µÄ×Ô½ç˵ºÅÁîÐй¤¾ßÀ´ÇÔÈ¡Êý¾Ý¡£¡£Õâ¿î¶¨Öƹ¤¾ß¿ÉÄܸü¿ì¡¢¸ü¸ßЧµØ´ÓÊÜϰȾ»·¾³ÖÐÇÔÈ¡Êý¾Ý£¬£¬Í¬Ê±¶ã±Ü°²È«½â¾ö¹æ»®µÄ¼ì²â¡£¡£ÈüÃÅÌú¿Ë×êÑÐÈËÔ±ÒÔΪ£¬£¬¹¥»÷ÕßתÏòʹÓö¨Öƹ¤¾ß£¬£¬Åú×¢ËûÃÇÕýÔÚͶÈ빦·òºÍ¾«Á¦¿ª·¢×¨ÓжñÒâÈí¼þ£¬£¬ÒÔÆÚÔÚ¹¥»÷µÄ¹Ø¼ü½×¶Îά³Ö½ÏµÍµÄ¿É¼û¶È£¬£¬´Ó¶øÔ¤·ÀʹÓÃRcloneºÍMegaSyncµÈ¹«¿ª¹¤¾ß£¬£¬ÕâЩ¹¤¾ßͨ³£»á´¥·¢°²È«¾¯±¨¡£¡£¸Ã¶¨Öƹ¤¾ßÏνӵ½Ò»¸öÓ²±àÂëµÄ·þÎñÆ÷µØÖ·£¬£¬ÔÚ»úÄÜÓë¶ã±ÜÄÜÁ¦ÉÏ×öÁ˶àÏîÓÅ»¯£º£º£ºÖ§³Öÿ¸öÎļþͬʱ³ÉÁ¢Îå¸öÏνӣ¬£¬Í¨¹ý²¢ÐÐÉÏ´«ÊµÏÖ¸ü¿ìµÄÊý¾Ýй¶£»Ã¿´«Êä2GBÁ÷Á¿ºóÂÖ»»TCPÏνӣ¬£¬ÒÔ¶ã±ÜÍøÂç¼à¿Ø£»¿ÉÑ¡ÔñÐÔµØÉ¸Ñ¡ÎļþÀàÐÍ£¬£¬Åųý´óÐÍ¡¢Á®¼ÛÖµµÄýÌåÎļþ£»Ê¹ÓÃÉí·ÝÑéÖ¤ÃÜÔ¿ÏÞ¶ÈÍⲿÈËÔ±¶Ô±»ÇÔÊý¾ÝµÄ½Ó¼û¡£¡£ÔÚÒ»´ÎÒѼͼµÄ¹¥»÷ÊÂÎñÖУ¬£¬¸Ã¹¤¾ß±»ÓÃÀ´ÇÔÈ¡ÍøÂçÇý¶¯Æ÷Éϵĸ߼ÛÖµÎĵµ£¬£¬ÀýÈ緢ƱºÍPDFÎļþ¡£¡£
https://www.bleepingcomputer.com/news/security/trigona-ransomware-attacks-use-custom-exfiltration-tool-to-steal-data/
4. UNC6692½èTeamsÌáÒéÉç½»¹¤³Ì¹¥»÷
4ÔÂ23ÈÕ£¬£¬´Ëǰδ¼Í¼ÔÚ°¸µÄÍþв»î¶¯¼¯ÈºUNC6692±»·¢ÏÖÀûÓÃMicrosoft Teams½øÐÐÉç½»¹¤³Ì¹¥»÷£¬£¬ÔÚÊÜϰȾµÄÖ÷»úÉϲ¿ÊðÃûΪSNOWµÄ¶¨ÖÆÄ£¿£¿£¿é»¯¶ñÒâÈí¼þÌ×¼þ¡£¡£Óë½üÄêÀ´ºÜ¶àÆäËûÈëÇÖÊÂÎñÀàËÆ£¬£¬UNC6692ÑÏÖØÒÀÀµ¼ÙÒâIT·þÎñ̨Ա¹¤£¬£¬ÓÕÆÊܺ¦Õß½ÓÊÜÀ´×ÔÆä×éÖ¯ÍⲿÕË»§µÄMicrosoft Teams̸ÌìÔ¼Çë¡£¡£¸Ã¼¯ÈºÒѱ»Ö¤ÊµÓëÒ»³¡´ó¹æÄ£µç×ÓÓʼþºäÕ¨»î¶¯Óйأ¬£¬¹¥»÷ÕßÊ×ÏÈͨ¹ý´óÁ¿À¬»øÓʼþ¸²Ã»Ö¸±êÓû§µÄÊÕ¼þÏäÖÆ×÷Ðéα½ôÆÈ¸Ð£¬£¬Ëæºóͨ¹ýTeams¼ÙÒâITÖ§³ÖÍŶӣ¬£¬Ðû³Æ¿ÉÐÖú½â¾öÓʼþÎÊÌâ¡£¡£ReliaQuest»ã±¨ÏÔʾ£¬£¬¹¥»÷ÕßÕýÀûÓô˲½ÖèÕë¶ÔÆóÒµ¸ß¹ÜºÍ¸ß¼¶Ô±¹¤ÒÔ»ñÈ¡ÆóÒµÍøÂç³õʼ½Ó¼ûȨÏÞ£¬£¬½ø¶ø½øÐÐÊý¾ÝÇÔÈ¡¡¢ºáÏòÒÆ¶¯¡¢ÀÕË÷Èí¼þ²¿ÊðºÍÚ²ÆÀÕË÷¡£¡£UNC6692ÔÚ»ñµÃ³õʼ½Ó¼ûºó»¹Ö´ÐÐÁ˺áÏòÒÆ¶¯£¨É¨Ãè135/445/3389¶Ë¿Ú£©¡¢Í¨¹ýPsExec³ÉÁ¢»á»°¡¢ÀûÓÃWMTÌáÈ¡LSASS¹ý³ÌÄÚ´æ½øÐÐȨÏÞÌáÉý£¬£¬ÒÔ¼°Ê¹ÓÃPass-The-Hash¼¼ÊõºáÏòÒÆ¶¯µ½Óò½ÚÖÆÆ÷£¬£¬ÏÂÔØFTK Imager²¶»ñActive DirectoryÊý¾Ý²¢Í¨¹ýLimeWireй¶¡£¡£
https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
5. Checkmarx KICS Docker¾µÏñÓëVSCodeÀ©´óÔâÈëÇÖ
4ÔÂ23ÈÕ£¬£¬ºÚ¿ÍÈëÇÖÁËCheckmarx KICS·ÖÎö¹¤¾ßµÄDocker¾µÏñ¡¢VSCodeºÍOpen VSXÀ©´ó£¬£¬Ö¼ÔÚ´Ó¿ª·¢ÈËÔ±»·¾³ÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£SocketÔÚÊÕµ½Docker¹ØÓÚ¶ñÒâ¾µÏñ±»ÍÆË͵½¹Ù·½checkmarx/kics Docker Hub²Ö¿âµÄ¾¯±¨ºó·¢Õ¹µ÷²é£¬£¬·¢ÏÖÕâ´ÎÈëÇÖ²»½öÏÞÓÚ±»Ö²ÈëľÂíµÄDocker¾µÏñ£¬£¬»¹²¨¼°VSCodeºÍOpen VSXÀ©´ó¡£¡£ÕâЩÀ©´óÏÂÔØÁËÒ»¸ö°µ²ØµÄ¡°MCP²å¼þ¡±Ö°ÄÜ£¬£¬¸ÃÖ°ÄÜÓÃÓÚ»ñÈ¡ÇÔÈ¡°ÂÃØµÄ¶ñÒâÈí¼þ¡£¡£Socket·¢ÏÖ£¬£¬¡°MCP²å¼þ¡±Ö°ÄÜÊÇ´ÓÓ²±àÂëµÄGitHub URLÏÂÔØµÄ¡°¶à½×¶Îƾ֤ÇÔÈ¡ºÍ´«²¼×é¼þ¡±£¬£¬¸Ã¶ñÒâÈí¼þרÃÅÕë¶ÔKICS´¦ÖõÄÊý¾Ý£¬£¬Ô̺¬GitHubÁîÅÆ¡¢ÔÆÆ¾Ö¤¡¢npmÁîÅÆ¡¢SSHÃÜÔ¿¡¢ClaudeÅäÖúͻ·¾³±äÁ¿¡£¡£±ØÒª°ÑÎȵÄÊÇ£¬£¬Docker±êÇ©±»ÁÙÊ±ÖØ¶¨Ïòµ½Ò»¸ö¶ñÒâÌáÒª£¬£¬Òò¶øÓ°ÏìÈ¡¾öÓÚ¾µÏñ±»ÀÈ¡µÄ¹¦·ò¡£¡£TeamPCPºÚ¿Í¹«¿ªÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£¡£CheckmarxÒѰ䲼°²È«²¼¸æ£¬£¬È·ÈÏËùÓжñÒⷨʽÒÑɾ³ý£¬£¬Ð¹Â¶µÄÍ´´¦Òѱ»³·Ïú²¢ÂÖ»»£¬£¬Ä¿Ç°ÕýÓëÍⲿר¼ÒºÏ×÷µ÷²é¡£¡£½¨ÒéÊÜÓ°ÏìÓû§×èÖ¹½Ó¼ûÌØ¶¨¶ñÒâÓòÃû£¬£¬Ê¹Óù̶¨SHAÖµ£¬£¬¸´Ôµ½ÒÑÖª°²È«°æ±¾¡£¡£
https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/
6. CISA´¹Î£¶½´Ùµ±¾Ö»ú¹¹ÐÞ²¹DefenderÁãÈÕ·ì϶
4ÔÂ23ÈÕ£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÒѺÅÁîÁª°î»ú¹¹ÔÚÁ½ÖÜÄÚ²ÉÈ¡´ëÊ©£¬£¬±£»¤ÆäWindowsϵͳÃâÊÜÒ»¸öÒѱ»ÓÃÓÚÁãÈÕ¹¥»÷µÄMicrosoft DefenderȨÏÞÌáÉý·ì϶µÄÇÖº¦¡£¡£¸Ã·ì϶±»×·×ÙΪCVE-2026-33825£¬£¬´úºÅ¡°BlueHammer¡±£¬£¬ÊôÓÚ¸ßΣ¼¶±ð¡£¡£ËüÔÊÐíµÍȨÏ޵ı¾µØÍþвÐÐΪÕßÀûÓýӼû½ÚÖÆÁ£¶È¹ýϸµÄÈõµã£¬£¬ÔÚδ´ò²¹¶¡µÄÉ豸ÉÏ»ñµÃSYSTEM×î¸ßȨÏÞ¡£¡£Î¢ÈíÓÚ4ÔÂ14ÈÕÔÚ¡°²¹¶¡ÐÇÆÚ¶þ¡±»î¶¯ÖÐÐÞ¸´Á˸÷ì϶¡£¡£´ËǰһÖÜ£¬£¬°²È«×êÑÐÔ±¡°Chaotic Eclipse¡±Îª¿¹Òé΢Èí°²È«ÏìÓ¦ÖÐÐÄ£¨MSRC£©µÄ·ì϶Åû¶Á÷³Ì£¬£¬²»½ö½«·ì϶¶¨ÃûΪBlueHammer£¬£¬»¹¹«¿ª°ä²¼Á˸ÅÄîÑéÖ¤ÀûÓôúÂë¡£¡£¸üΪÑϸñµÄÊÇ£¬£¬Huntress Labs°²È«×êÑÐÈËÔ±ÓÚ4ÔÂ16ÈÕÅû¶£¬£¬ÒÑÓй¥»÷ÕßÀûÓÃÕâЩÁãÈÕ·ì϶·¢ÆðÏÖʵ¹¥»÷£¬£¬ÇÒÏÔʾ³ö¡°ÏÖʵ²Ù×÷¼üÅ̵ÄÍþвÐÐΪÕ߻¡±µÄÃ÷È·Ö¤¾Ý¡£¡£µ÷²é·¢ÏÖ£¬£¬ÊÜϰȾ»·¾³´æÔÚ¿ÉÒɵÄFortiGate SSL VPN½Ó¼û¼Í¼£¬£¬Ô̺¬Ò»¸öλÓÚ¶íÂÞ˹µÄÔ´IPµØÖ·£¬£¬²¢ÔÚÆäËûµØÓòÒ²·¢ÏÖÁË¿ÉÒÉ»ù´¡ÉèÊ©¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ