CVE-2023-6971
CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th
The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the 'content-dir' HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server's php.ini is configured with 'allow_url_include' set to 'on'. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP.
| Vendor | migrate |
| Product | backup migration |
| Published | Dec 23, 2023 |
| Last Updated | Aug 2, 2024 |
Stay Ahead of the Next One
Get instant alerts for migrate backup migration
Be the first to know when new high vulnerabilities affecting migrate backup migration are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
migrate / Backup Migration
1.0.8 โค 1.3.9
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b380283c-0dbb-4d67-9f66-cb7c400c0427?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/backup-heart.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3012745/backup-backup
Credits
NP3228