Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

WordPress BackWPup Plugin 'wpabs' Parameter Remote PHP Code Execution Vulnerability

Information

Severity

Severity

High

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

This host is installed with WordPress BackWPup Plugin and is prone to remote PHP code execution vulnerability.

Insight

Insight

The flaws are caused by improper validation of user-supplied input to the 'wpabs' parameter in 'wp-content/plugins/backwpup/app/wp_xml_export.php', which allows attackers to execute arbitrary PHP code in the context of an affected site. NOTE : Exploit will only work properly with the following PHP settings: register_globals=On, allow_url_include=On and magic_quotes_gpc=Off

Affected Software

Affected Software

BackWPup Wordpress plugin version 1.6.1, Other versions may also be affected.

Solution

Solution

Upgrade BackWPup Wordpress plugin to 1.7.1 or later.

Common Vulnerabilities and Exposures (CVE)