CVE-2023-6553

CRITICAL EXPLOITED NUCLEI LAB

WordPress Backup Migration Plugin PHP Filter Chain RCE

Title source: metasploit

Description

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

Exploits (7)

nomisec WORKING POC 80 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2023-6553
nomisec WORKING POC 4 stars
by motikan2010 · remote
https://github.com/motikan2010/CVE-2023-6553-PoC
nomisec WORKING POC 2 stars
by 0x00phantom-hat · poc
https://github.com/0x00phantom-hat/CVE-2023-6553-RCE-Exploit
nomisec WORKING POC 1 stars
by Aliyankhan-source · poc
https://github.com/Aliyankhan-source/CVE-2023-6553-RCE-Fancy-Exploit
nomisec WORKING POC
by Harshit-Mashru · remote
https://github.com/Harshit-Mashru/CVE-2023-6553
nomisec WORKING POC
by cc3305 · remote
https://github.com/cc3305/CVE-2023-6553
metasploit WORKING POC EXCELLENT
by Nex Team, Valentin Lobstein, jheysel-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_backup_migration_php_filter.rb

Nuclei Templates (1)

Worpress Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
CRITICALby FLX
Shodan: http.html:/wp-content/plugins/backup-backup/
FOFA: body=/wp-content/plugins/backup-backup/

Scores

CVSS v3 9.8
EPSS 0.9301
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-12-16
CWE
CWE-94
Status published
Products (2)
backupbliss/backup_migration < 1.3.7
inisev/BackupBliss – Backup & Migration with Free Cloud Storage < 1.3.7
Published Dec 15, 2023
Tracked Since Feb 18, 2026