Lucene search

K
wpvulndbWpvulndbWPVDB-ID:9819C6D8-F805-426F-B20B-E6A38715A273
HistoryDec 22, 2023 - 12:00 a.m.

Backup Migration 1.0.8 - 1.3.9 - Remote File Inclusion via content-dir

2023-12-2200:00:00
wpscan.com
14
wordpress
remote file inclusion
vulnerability
php 7.4

AI Score

7.6

Confidence

High

EPSS

0.004

Percentile

73.6%

Description The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the ‘content-dir’ HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server’s php.ini is configured with ‘allow_url_include’ set to ‘on’. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP.

AI Score

7.6

Confidence

High

EPSS

0.004

Percentile

73.6%

Related for WPVDB-ID:9819C6D8-F805-426F-B20B-E6A38715A273