HomeWeb HostingWordPress 6.9.4 Released: 3 Security Vulnerabilities That Put Your Site at Risk

WordPress 6.9.4 Released: 3 Security Vulnerabilities That Put Your Site at Risk

Published on

Perplexity Search API: Real-Time Web Retrieval That Outperforms Closed Search Systems

Search APIs have not fundamentally changed how they surface content for AI systems until now. Perplexity has opened access to the same retrieval infrastructure that powers its public answer engine, and the architecture is built differently from the ground up.

Quick Brief

  • WordPress released 6.9.4 after the security team confirmed 6.9.3 left critical fixes incomplete
  • Three confirmed vulnerabilities: a PclZip path traversal flaw, an authorization bypass, and an XXE injection
  • A separate malicious ClickFix campaign was already targeting WordPress sites before this patch chain began
  • WordPress recommends all site owners update immediately via Dashboard, then Updates, then Update Now

WordPress shipped three core updates in roughly 24 hours, and the reason behind the final release matters more than the version number. The WordPress Security Team confirmed that 6.9.3 failed to fully apply its own fixes, which forced 6.9.4 to ship with the remaining patches. This article breaks down exactly what each vulnerability does, who discovered it, and the fastest path to securing your site today.

What Triggered Three Updates in 24 Hours

The update chain began on March 10, 2026, when WordPress 6.9.2 addressed 10 security issues along with a bug affecting template file loading on a limited number of sites. WordPress 6.9.3 shipped the same day, but the Security Team quickly confirmed that not all of the security fixes had been fully applied.

That gap forced a third release. The sequence started with a security release, followed almost immediately by a bug-fix update, and then another patch to stabilize the ecosystem. For a platform running on millions of live sites, that pace is unusual and reflects the complexity that even a single incomplete fix introduces across thousands of plugin integrations.

Separately, researchers had already reported malicious campaigns targeting WordPress sites. Attackers were compromising installations and injecting scripts that displayed fake CAPTCHA prompts to visitors. When visitors attempted to complete the fake verification, the prompt instructed them to paste a command into their system terminal or PowerShell, downloading infostealer malware designed to capture credentials and system data. Security researchers call this technique “ClickFix,” which tricks users into executing commands themselves rather than relying on traditional drive-by exploits.

The 3 Vulnerabilities Fixed in WordPress 6.9.4

The WordPress Security Team credited Thomas Kräftner specifically for responsible disclosure related to this release. Three distinct vulnerabilities are confirmed fixed in 6.9.4.

PclZip Path Traversal (Reported by Francesco Carlucci and kaminuma)

A path traversal vulnerability in PclZip allows attackers to write files outside the intended directory during archive extraction. In practice, a malicious ZIP file upload could place executable code in locations that WordPress never intended to be writable. Sites using import plugins, theme uploaders, or any feature handling ZIP files face the highest exposure from this flaw.

Authorization Bypass on the Notes Feature (Reported by kaminuma)

This vulnerability allows a lower-privileged user to access or modify Notes functionality reserved for higher roles. Authorization bypass flaws require no advanced technical skills to exploit. An authenticated attacker with a basic account could potentially perform actions well beyond their assigned permissions.

XXE in the External getID3 Library (Reported by Youssef Achtatal)

XML External Entity (XXE) injection in the getID3 library affects how WordPress processes media file metadata. The getID3 library extracts information from audio and video files. A crafted media file uploaded to an affected site could force the server to read arbitrary files, including sensitive server-side data.

Who Is at Risk

Any site running WordPress 6.9, 6.9.1, 6.9.2, or 6.9.3 carries at least one of these unpatched vulnerabilities. Sites accepting user-uploaded content, running open registration, or using media libraries with public contributor access face the most direct risk from these three specific flaws.

The broader context matters as well. When WordPress 6.9 originally launched, several major plugins required emergency fixes after compatibility issues surfaced. WooCommerce checkout pages failed, Elementor editors broke, and SEO tools required updates within days of the release. That history shows how sensitive the plugin and theme ecosystem is to core-level changes, which is why the Security Team moves fast when fixes are incomplete.

How to Update to WordPress 6.9.4 Right Now

The update process takes under two minutes for most sites. Follow these steps:

  1. Log into your WordPress admin panel
  2. Navigate to Dashboard, then Updates
  3. Click “Update Now” to install WordPress 6.9.4
  4. Confirm the version number under Dashboard, then About WordPress after the update completes

Sites with automatic background updates enabled have already received this patch without any manual action required. If you manage multiple WordPress installations, use WP-CLI or a site management platform to push updates across all sites simultaneously.

After updating, clear your site cache through your caching plugin or CDN to ensure visitors receive the patched version.

Update Plugins and Themes Immediately After

Updating WordPress core is the first step, not the only step. The guidance from the Search Engine World analysis is straightforward: update WordPress core first, then update plugins and themes, and verify functionality on a staging environment when possible.

Plugin and theme vulnerabilities represent a separate attack surface from core. Any plugin handling file uploads, user authentication, or media processing deserves priority review after this core update.

Limitations and Considerations

WordPress 6.9.4 resolves three specific vulnerabilities in WordPress core. It does not address risks introduced by outdated plugins and themes, which represent a separate category of exposure. Site owners managing high-traffic or eCommerce installations should test updates in a staging environment before applying them to production, particularly when running payment or membership plugins.

What the Update Sequence Reveals

Three security releases in roughly 24 hours is not a sign of a broken platform. It reflects a security team responding at the speed that modern threat environments demand. The WordPress Security Team identified the gap in 6.9.3’s fixes and shipped the correction before wider exploitation of the specific 6.9.4 vulnerabilities occurred.

The practical lesson for site owners is straightforward: delaying core security updates compounds risk. Running 6.9.4 closes the three confirmed code-level vulnerabilities. Keeping plugins and themes current addresses the broader attack surface. Both actions together reflect the minimum standard for responsible site management in 2026.

Frequently Asked Questions (FAQs)

What exactly is fixed in WordPress 6.9.4?

WordPress 6.9.4 fixes three vulnerabilities left incomplete by 6.9.3: a PclZip path traversal issue that allows malicious file writes outside intended directories, an authorization bypass on the Notes feature that grants unintended access to lower-privileged users, and an XXE injection flaw in the external getID3 media library.

Is WordPress 6.9.4 a mandatory update?

The WordPress core team officially recommends updating immediately, classifying this as a security release. While WordPress cannot force updates on self-hosted installations, skipping this patch leaves three confirmed vulnerabilities active on your site at a time when attackers are actively targeting WordPress installations using ClickFix and other techniques.

What is the ClickFix attack campaign targeting WordPress sites?

ClickFix is a social engineering technique where attackers compromise WordPress sites and inject scripts that show visitors fake CAPTCHA prompts. When users try to complete the fake verification, they are instructed to paste a command into their terminal or PowerShell window. That command downloads infostealer malware designed to capture credentials and system data. This campaign is separate from the three code-level vulnerabilities fixed in 6.9.4.

How do I update WordPress to version 6.9.4?

Log into your WordPress admin panel, navigate to Dashboard then Updates, and click “Update Now.” Sites with automatic background updates already received the patch automatically. After updating, clear your site cache to ensure visitors load the patched version.

Does WordPress 6.9.4 affect my plugins or theme?

The update targets WordPress core files only. After any core security update, test critical plugin functionality, especially plugins that handle file uploads, user roles, or media processing. Check each plugin developer’s changelog for a compatibility update if you encounter conflicts.

What is an XXE injection vulnerability?

XML External Entity injection exploits how an application processes XML input. In WordPress’s case, a crafted media file could trick the getID3 library into reading sensitive server files or making unintended network requests. This type of vulnerability can expose configuration data and server-side files if left unpatched.

Will auto-updates push WordPress 6.9.4 to my site automatically?

Yes. Sites configured for automatic background updates will receive WordPress 6.9.4 without manual intervention. You can verify automatic updates are enabled under Dashboard, then Updates. Managed WordPress hosting platforms typically apply security releases automatically within hours of the official release.

What is a PclZip path traversal vulnerability?

Path traversal in PclZip allows a specially crafted ZIP archive to write files outside the directory WordPress intends during extraction. Attackers can exploit this to place malicious files in locations that execute on your server. This flaw affects any WordPress functionality that processes ZIP files, including plugin and theme installers.

Tauqeer Aziz
Tauqeer Aziz
Tauqeer Aziz is a Senior Tech Writer for the Web Hosting category at AdwaitX. He specializes in simplifying complex infrastructure topics, helping business owners and developers navigate the crowded world of hosting solutions. From decoding pricing structures to comparing uptime performance, Tauqeer writes comprehensive guides on Shared, VPS, and Cloud hosting to ensure readers choose the right foundation for their websites.

Latest articles

Perplexity Search API: Real-Time Web Retrieval That Outperforms Closed Search Systems

Search APIs have not fundamentally changed how they surface content for AI systems until now. Perplexity has opened access to the same retrieval infrastructure that powers its public answer engine, and the architecture is built differently from the ground up.

Xbox Project Helix: Microsoft’s Next Console Targets a New Generation of Performance

Announced at GDC 2026 by Jason Ronald, Vice President of Next Generation at Xbox, this is not a hardware revision or mid-cycle refresh. It is a generational platform change

Perplexity Agent API: The Managed Runtime Developers Have Been Waiting For

The Perplexity Agent API removes those layers entirely. It is a multi-provider, interoperable runtime that handles model routing, tool execution, and reasoning

my.WordPress.net: The WordPress That Lives in Your Browser, Not on a Server

WordPress just eliminated the single biggest reason people avoid it. my.WordPress.net launches a full WordPress environment directly in your browser, with no hosting plan, no domain purchase, and no account creation

More like this

Perplexity Search API: Real-Time Web Retrieval That Outperforms Closed Search Systems

Search APIs have not fundamentally changed how they surface content for AI systems until now. Perplexity has opened access to the same retrieval infrastructure that powers its public answer engine, and the architecture is built differently from the ground up.

Xbox Project Helix: Microsoft’s Next Console Targets a New Generation of Performance

Announced at GDC 2026 by Jason Ronald, Vice President of Next Generation at Xbox, this is not a hardware revision or mid-cycle refresh. It is a generational platform change

Perplexity Agent API: The Managed Runtime Developers Have Been Waiting For

The Perplexity Agent API removes those layers entirely. It is a multi-provider, interoperable runtime that handles model routing, tool execution, and reasoning