9.8
CVE-2019-25224
- EPSS 80.01%
- Veröffentlicht 25.07.2025 03:15:32
- Zuletzt bearbeitet 11.08.2025 18:57:45
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WP Database Backup < 5.2 - Unauthenticated OS Command Injection
The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the host operating system.
Mögliche Gegenmaßnahme
WP Database Backup – Unlimited Database & Files Backup by Backup for WP: Update to version 5.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP Database Backup – Unlimited Database & Files Backup by Backup for WP
Version
[*, 5.2)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpseeds ≫ Wp Database Backup SwPlatformwordpress Version < 5.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 80.01% | 0.991 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.