WordPress Backup Migration Plugin PHP Filter Chain RCE
Title source: metasploitDescription
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
Exploits (7)
nomisec
WORKING POC
4 stars
by motikan2010 · remote
https://github.com/motikan2010/CVE-2023-6553-PoC
nomisec
WORKING POC
2 stars
by 0x00phantom-hat · poc
https://github.com/0x00phantom-hat/CVE-2023-6553-RCE-Exploit
nomisec
WORKING POC
1 stars
by Aliyankhan-source · poc
https://github.com/Aliyankhan-source/CVE-2023-6553-RCE-Fancy-Exploit
metasploit
WORKING POC
EXCELLENT
by Nex Team, Valentin Lobstein, jheysel-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_backup_migration_php_filter.rb
Nuclei Templates (1)
Worpress Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
CRITICALby FLX
Shodan:
http.html:/wp-content/plugins/backup-backup/
FOFA:
body=/wp-content/plugins/backup-backup/
References (8)
Scores
CVSS v3
9.8
EPSS
0.9301
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+4 more repos
Details
VulnCheck KEV
2023-12-16
CWE
CWE-94
Status
published
Products (2)
backupbliss/backup_migration
< 1.3.7
inisev/BackupBliss – Backup & Migration with Free Cloud Storage
< 1.3.7
Published
Dec 15, 2023
Tracked Since
Feb 18, 2026