CVE-2007-5800

BackUpWordPress <0.4.2b - RCE

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4) Reader.php, and other unspecified scripts under plugins/BackUp/Archive/.

Exploits (1)

exploitdb WORKING POC VERIFIED
by S.W.A.T. · textwebappsphp
https://www.exploit-db.com/exploits/4593

References (10)

Core 10
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38479
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/3744
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38476
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38477
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38212
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4593
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26290
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38478

Scores

EPSS 0.0749
EPSS Percentile 91.8%

Details

CWE
CWE-94
Status published
Products (1)
tom_willmot/backupwordpress_plugin < 0.4.2b
Published Nov 03, 2007
Tracked Since Feb 18, 2026