The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible.
History

Mon, 28 Oct 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Yaniiliev
Yaniiliev all In One Wp Migration And Backup
CPEs cpe:2.3:a:yaniiliev:all_in_one_wp_migration_and_backup:*:*:*:*:*:*:*:*
Vendors & Products Yaniiliev
Yaniiliev all In One Wp Migration And Backup
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 28 Oct 2024 05:45:00 +0000

Type Values Removed Values Added
Description The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible.
Title All-in-One WP Migration and Backup <= 7.86 - Authenticated (Administrator+) Arbitrary PHP Code Injection
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-28T05:32:24.968Z

Updated: 2024-10-28T12:42:02.445Z

Reserved: 2024-09-24T18:19:52.183Z

Link: CVE-2024-9162

cve-icon Vulnrichment

Updated: 2024-10-28T12:41:57.389Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-28T06:15:04.593

Modified: 2024-10-28T13:58:09.230

Link: CVE-2024-9162

cve-icon Redhat

No data.