Impact
The GWD Connect plugin for WordPress includes two PHP scripts (gwd-backup.php and gwd-logs.php) that expose an update_agent endpoint. The plugin fails to verify authentication when no API key has been configured – the default state for unregistered installations – allowing attackers to send specially crafted requests that write arbitrary PHP code to the agent file, enabling limited code execution on the server.
Affected Systems
WordPress sites running the GWD Connect plugin from GWD Conex, all release versions up to and including 2.9, with the default configuration of no API key and no external authentication.
Risk and Exploitability
The vulnerability carries a CVSS score of 4.8, indicating moderate impact. EPSS data is not available, and the flaw is not listed in CISA’s KEV catalog. Attackers can exploit it by issuing an unauthenticated HTTP request to the update_agent endpoint on an unregistered site that has not configured an API key. The exploitation grants the ability to inject PHP code, but is limited to the plugin’s agent file and therefore may not provide full system compromise without additional vulnerabilities or misconfigurations.
OpenCVE Enrichment