Critical severity9.8NVD Advisory· Published Dec 15, 2023· Updated Apr 8, 2026
CVE-2023-6553
CVE-2023-6553
Description
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
Affected products
1- cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*Range: <=1.3.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.phpnvdPatch
- plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.phpnvdPatch
- plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.phpnvdPatch
- plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.phpnvdPatch
- plugins.trac.wordpress.org/changesetnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/3511ba64-56a3-43d7-8ab8-c6e40e3b686envdThird Party Advisory
- www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-itnvdNot Applicable
- packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.htmlnvd
News mentions
0No linked articles in our index yet.