Логотип exploitDog
bind:CVE-2023-6553
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6553

Количество 3

Количество 3

nvd логотип

CVE-2023-6553

около 2 лет назад

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-2rcj-3wpj-27f2

около 2 лет назад

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2023-08960

около 2 лет назад

Уязвимость плагина Backup Migration системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6553

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

CVSS3: 9.8
94%
Критический
около 2 лет назад
github логотип
GHSA-2rcj-3wpj-27f2

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

CVSS3: 9.8
94%
Критический
около 2 лет назад
fstec логотип
BDU:2023-08960

Уязвимость плагина Backup Migration системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
94%
Критический
около 2 лет назад

Уязвимостей на страницу