🔐 CVE Alert

CVE-2011-10033

UNKNOWN 0.0

WordPress Plugin is-human <= v1.4.2 Eval Injection RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.

CWE CWE-95
Vendor is-human wordpress plugin
Product is-human wordpress plugin
Published Oct 15, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for is-human wordpress plugin is-human wordpress plugin

Be the first to know when new unknown vulnerabilities affecting is-human wordpress plugin is-human wordpress plugin are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

is-human WordPress Plugin / is-human WordPress Plugin
* ≤ 1.4.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordpress.org: https://wordpress.org/plugins/is-human/ exploit-db.com: https://www.exploit-db.com/exploits/17299 web.archive.org: https://web.archive.org/web/20120115212202/http://blog.spiderlabs.com/2012/01/honeypot-alert-is-human-wordpress-plugin-remote-command-execution-attack-detected.html trustwave.com: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-alert-more-wordpress-is_human-plugin-remote-command-injection-attack-detected/ vulncheck.com: https://www.vulncheck.com/advisories/wordpress-plugin-is-human-eval-injection-rce

Credits

neworder