CVE-2020-35948

high-risk
Published 2021-01-01

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.

Do I need to act?

!
36.4% chance of exploitation in next 30 days
EPSS score — higher than 64% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: e664277ab246856a57ee274cc7e0e4a367650059
9
CVSS 9.9/10 Critical
NETWORK / LOW complexity

Affected Products (1)

Affected Vendors

54
/ 100
high-risk
Severity 33/34 · Critical
Exploitability 16/34 · Moderate
Exposure 5/34 · Minimal