WP Ghost in the Machine: Critical Flaw Leaves 200,000 WordPress Sites Spooked!
WP Ghost, a WordPress security plugin, ironically has a vulnerability that lets hackers do a full site takeover. This flaw, CVE-2025-26909, affects versions up to 5.4.01. So, if your site’s security feels like a ghost town, it’s time to upgrade!

Hot Take:
WP Ghost: The friendly neighborhood WordPress guardian with a heart of gold—and apparently a couple of gaping security holes. It seems even the security superheroes have their Kryptonite moments. But fear not! A patch is here to save the day, proving again that not all heroes wear capes—some just sport a nifty version number upgrade.
Key Points:
- WP Ghost, a popular WordPress security plugin, is vulnerable to a critical remote code execution flaw.
- The flaw has a CVSS score of 9.6 and is tracked as CVE-2025-26909, affecting versions up to 5.4.01.
- The vulnerability arises from insufficient input validation in the ‘showFile()’ function.
- The flaw primarily impacts setups with WP Ghost’s “Change Paths” feature in Lite or Ghost mode.
- A patch has been released in versions 5.4.02 and 5.4.03, urging users to upgrade to avoid potential exploitation.
Ghostly Gaffe
Imagine a ghost that’s supposed to keep your house safe from burglars but accidentally leaves the backdoor open. That’s essentially what WP Ghost did to over 200,000 WordPress sites. This WordPress security superstar, known for thwarting millions of hacking attempts, was caught with its security pants down when Patchstack unearthed a critical flaw. With a CVSS score of 9.6, this vulnerability is like the Godzilla of security flaws, ready to stomp all over unsuspecting websites.
Code Execution Chaos
At the heart of this digital disaster is a little function called ‘showFile()’ with a big attitude problem: insufficient input validation. This means that with a few URL tricks, cybercriminals could potentially execute their own code on your server, taking over your website like the cyber equivalent of a hostile alien invasion. The flaw is particularly worrisome for those utilizing WP Ghost’s snazzy “Change Paths” feature in Lite or Ghost mode—though not enabled by default, it’s a popular setting among users who like to live on the edge.
Patch to the Rescue
But wait! Before you start lighting your torches and sharpening your pitchforks, WP Ghost’s team has swooped in with a fix faster than you can say “cybersecurity catastrophe.” After the flaw was identified by the diligent researcher Dimas Maulana, the developers got busy, rolling out an update on March 4. Versions 5.4.02 and 5.4.03 now come with an extra layer of validation, ensuring that sneaky URL paths won’t sneak their way into your server like uninvited party guests.
Get with the Update Program
If you’re a WordPress wizard who relies on WP Ghost, it’s time to channel your inner IT guru and update your plugin faster than a cat video goes viral. This patch is like the digital seatbelt you never knew you needed—until now. With the new versions, you can breathe a sigh of relief, knowing that your website won’t be turned into a playground for cybercriminals looking for some RCE fun.
So, let’s give a round of applause to the unsung heroes of cybersecurity—the developers and researchers who make sure that even when the ghosts of vulnerabilities past come knocking, we’re ready with a digital proton pack to keep them at bay.