WordPress.Backup.Migration.Plugin.ajax.php.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in WordPress Project Backup Migration Plugin.
This vulnerability is due to improper input validation in ajax.php. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in the execution of arbitrary OS commands in the security context of the web server running the vulnerable application.

affected-products-logoAffected Products

WordPress Project Backup Migration Plugin prior to 1.4.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://wordpress.org/plugins/backup-backup/#developers

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2024-03-05 27.743
Modified
Default_action:pass:drop
2024-02-22 26.738
New