WP Database Backup Plugin for WordPress < 5.2 Command Injection

high Web App Scanning Plugin ID 98628

Synopsis

WP Database Backup Plugin for WordPress < 5.2 Command Injection

Description

The WordPress WP Database Backup Plugin installed on the remote host is affected by an operating system command injection vulnerability due to improper sanitization of user-supplied input.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to WP Database Backup Plugin for WordPress 5.2 or latest.

See Also

https://blog.sucuri.net/2019/06/os-command-injection-in-wp-database-backup.html

https://wordpress.org/plugins/wp-database-backup/

Plugin Details

Severity: High

ID: 98628

Type: remote

Published: 6/13/2019

Updated: 3/14/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: Tenable

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: Tenable

Vulnerability Information

Exploit Ease: No known exploits are available

Patch Publication Date: 5/28/2019

Vulnerability Publication Date: 5/28/2019

Reference Information