<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4132 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4132/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 09:16:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4132/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress HTTP Headers Plugin Remote Code Execution via File Path Manipulation (CVE-2026-4132)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</link><pubDate>Wed, 22 Apr 2026 09:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wordpress-http-headers-rce/</guid><description>The HTTP Headers WordPress plugin is vulnerable to remote code execution (RCE) due to insufficient validation of the htpasswd file path and lack of sanitization of the username, allowing authenticated administrators to write arbitrary code to the server.</description><content:encoded><![CDATA[<p>The HTTP Headers plugin for WordPress, versions up to and including 1.19.2, is vulnerable to remote code execution (RCE) due to a file path manipulation vulnerability (CVE-2026-4132). This vulnerability stems from the plugin&rsquo;s insufficient validation of the &lsquo;hh_htpasswd_path&rsquo; option, which controls the location of the .htpasswd file. Furthermore, the &lsquo;hh_www_authenticate_user&rsquo; option, used for setting the username for HTTP Basic Authentication, lacks proper sanitization. This allows attackers with administrator privileges to specify an arbitrary file path for the htpasswd file and inject unsanitized content into it. By crafting a malicious username containing PHP code and setting the htpasswd path to a web-accessible directory, an attacker can execute arbitrary code on the server. This exploit requires administrator-level access to the WordPress dashboard.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the WordPress dashboard with administrator privileges.</li>
<li>The attacker navigates to the HTTP Headers plugin settings page.</li>
<li>The attacker modifies the &lsquo;hh_htpasswd_path&rsquo; option, setting it to a web-accessible directory (e.g., <code>/var/www/html/wp-content/uploads/.shell.php</code>).</li>
<li>The attacker modifies the &lsquo;hh_www_authenticate_user&rsquo; option, injecting PHP code into the username field (e.g., <code>&lt;?php system($_GET['cmd']); ?&gt;</code>).</li>
<li>The <code>apache_auth_credentials()</code> function uses sprintf to combine the malicious username with a SHA hash, creating a crafted htpasswd entry.</li>
<li>The <code>update_auth_credentials()</code> function then writes the crafted content, including the injected PHP code, to the attacker-controlled file path using <code>file_put_contents()</code>.</li>
<li>The attacker accesses the newly created PHP file via a web browser (e.g., <code>http://example.com/wp-content/uploads/.shell.php?cmd=id</code>).</li>
<li>The injected PHP code executes, allowing the attacker to run arbitrary commands on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants the attacker remote code execution on the affected WordPress server. This can lead to complete compromise of the server, including data theft, website defacement, malware deployment, and further attacks against internal networks. Given the widespread use of WordPress and its plugins, a successful exploit could impact a large number of websites and organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the HTTP Headers plugin to a patched version (if available) to remediate CVE-2026-4132.</li>
<li>Monitor web server logs for requests to unusual file paths that match the &lsquo;hh_htpasswd_path&rsquo; setting specified in the plugin configuration to detect potential exploitation attempts.</li>
<li>Implement the Sigma rule to detect file creation events in web-accessible directories with PHP extensions that are triggered by the web server process.</li>
<li>Restrict access to the WordPress administrator dashboard to only trusted individuals and enforce strong password policies to prevent unauthorized access to plugin settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>plugin</category><category>cve-2026-4132</category></item></channel></rss>