Description
The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability check, nor validating user supplied input passed directly to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things. On WordPress sites running the Alone theme versions 7.8.4 and older, this can be chained with CVE-2025-5394 to install the Bears Backup plugin and achieve the same impact.
Published: 2025-07-17
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the bbackup_ajax_handle() function of the Bears Backup WordPress plugin. The function fails to enforce a capability check and directly passes user-supplied data to call_user_func(), enabling an attacker to execute arbitrary PHP code on the host. This flaw allows unauthenticated attackers to install backdoors, create administrative accounts, or perform any privileged operation on the server. The weakness is classified as CWE-94, code injection via a language interpreter.

Affected Systems

WordPress sites running the Bears Backup plugin version 2.0.0 or earlier. Sites that use the Alone theme 7.8.4 or older may also be impacted by chaining this flaw with CVE-2025-5394 to automatically install the vulnerable plugin, thereby extending the attack surface.

Risk and Exploitability

The CVSS score of 9.8 demonstrates a critical impact, while the EPSS score of less than 1% suggests that the likelihood of public exploitation is currently low; however, the flaw is not listed in the CISA KEV catalog. The attack vector is inferred to be via unauthenticated AJAX requests to the plugin's handler. An attacker needs only to exploit the missing capability check and the unsafe function call to achieve remote code execution, granting full control over the affected WordPress installation.

Generated by OpenCVE AI on April 21, 2026 at 19:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Bears Backup plugin to the latest version available, or uninstall it if not in use.
  • Update WordPress core and all themes to the latest releases, ensuring that the Alone theme is no longer at a vulnerable version; if the theme cannot be updated immediately, secure it in maintenance mode.
  • If immediate upgrade is not possible, disable the bbackup_ajax_handle endpoint through the web server’s configuration or a security plugin, or place the site in a well‑protected maintenance window to prevent unauthenticated access.

Generated by OpenCVE AI on April 21, 2026 at 19:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21756 The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability check, nor validating user supplied input passed directly to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things. On WordPress sites running the Alone theme versions 7.8.4 and older, this can be chained with CVE-2025-5394 to install the Bears Backup plugin and achieve the same impact.
History

Thu, 17 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Jul 2025 02:15:00 +0000

Type Values Removed Values Added
Description The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability check, nor validating user supplied input passed directly to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things. On WordPress sites running the Alone theme versions 7.8.4 and older, this can be chained with CVE-2025-5394 to install the Bears Backup plugin and achieve the same impact.
Title Bears Backup <= 2.0.0 - Unauthenticated Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:48.761Z

Reserved: 2025-05-30T16:17:17.008Z

Link: CVE-2025-5396

cve-icon Vulnrichment

Updated: 2025-07-17T14:38:19.440Z

cve-icon NVD

Status : Deferred

Published: 2025-07-17T02:15:27.547

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-5396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:45:16Z

Weaknesses