That's only true if you ignore all the details.
As usual, you cannot make a coherent understanding on just about any subject by reading headlines alone. Life would have taught you by now that the devil is in the details.
WP uses salt and multiple rounds of hashing, fully mitigating the md5 collisions being topic of discussion here.
So no, wp doesn't "use md5" in the sense that they would be vulnerable to this type of attack.
Source: https://developer.wordpress.org/reference/functions/wp_hash_...
>Can use it bypass some cached webshell detections.
The amount of sweet, sweet irony displayed here will make me diabetic. Did you read the article at all? Salting? What are you on about?
Honestly, it feels that some HN commenters are LLMs instructed to defend a given entity.
As the OP article/PoC is about hashing uploaded files, not passwords btw, I think you should read it again.
Because as I pointed out, wp_hash() is used to check against uploaded files.
Oh, and source: https://developer.wordpress.org/reference/functions/wp_hash/
And as I cannot resist quoting you for trying to smartass while literally not having read the source code the PoC was about:
> As usual, you cannot make a coherent understanding on just about any subject by reading headlines alone. Life would have taught you by now that the devil is in the details.