Vulnerability Description
The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the host operating system.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpseeds | Wp Database Backup | < 5.2 |
Related Weaknesses (CWE)
References
- https://blog.sucuri.net/2019/06/os-command-injection-in-wp-database-backup.htmlExploitThird Party Advisory
- https://packetstormsecurity.com/files/153781/ExploitThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2078035/wp-database-backupPatch
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/expExploit
- https://www.wordfence.com/blog/2019/05/os-command-injection-vulnerability-patcheExploitThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d21cf285-9d75-43a2-9e8Third Party Advisory
FAQ
What is CVE-2019-25224?
CVE-2019-25224 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbi...
How severe is CVE-2019-25224?
CVE-2019-25224 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-25224?
Check the references section above for vendor advisories and patch information. Affected products include: Wpseeds Wp Database Backup.