CERT-In Vulnerability Note
CIVN-2023-0382
Remote Code Execution Vulnerability in Backup Migration plugin for WordPress
Original Issue Date:December 21, 2023
Severity Rating: CRITICAL
Software Affected
- WordPress plugin Backup Migration version prior to 1.3.8
Overview
A vulnerability has been reported in Backup Migration plugin for WordPress which could allow an unauthenticated attacker to execute arbitrary code on the targeted system.
Description
This vulnerability exists in Backup Migration plugin for WordPress due to a flaw in /includes/backup-heart.php file. An attacker could exploit this vulnerability to control the values passed to an include, and subsequently leverage that to achieve remote code execution.
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate update as mentioned:
https://wordpress.org/plugins/backup-backup/
Vendor Information
WordPress
https://wordpress.org/plugins/backup-backup/
References
WordPress
https://wordpress.org/plugins/backup-backup/
Wordfence
https://www.wordfence.com/blog/2023/12/critical-unauthenticated-remote-code-execution-found-in-backup-migration-plugin/
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/backup-backup/backup-migration-137-unauthenticated-remote-code-execution
CVE Name
CVE-2023-6553
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|