Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
WordPress BackWPup Plugin 'wpabs' Parameter Remote PHP Code Execution Vulnerability
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with WordPress BackWPup Plugin and is prone to remote PHP code execution vulnerability.
Insight
Insight
The flaws are caused by improper validation of user-supplied input to the 'wpabs' parameter in 'wp-content/plugins/backwpup/app/wp_xml_export.php', which allows attackers to execute arbitrary PHP code in the context of an affected site. NOTE : Exploit will only work properly with the following PHP settings: register_globals=On, allow_url_include=On and magic_quotes_gpc=Off
Affected Software
Affected Software
BackWPup Wordpress plugin version 1.6.1, Other versions may also be affected.
Solution
Solution
Upgrade BackWPup Wordpress plugin to 1.7.1 or later.