CVE-2020-35948
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 01, 2021
- Published Date
- January 01, 2021
- Last Updated
- August 04, 2024
- Vendor
- n/a
- Product
- n/a
- Description
- An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.
- Tags
- Score
- 49.96% (Percentile: 97.65%) as of 2025-05-12
- Exploited in the Wild
- Yes (2020-09-22 13:28:02 UTC) Source
wordpress
php
CVSS Scores
CVSS v3.1
9.9 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v2.0
6.5
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
EPSS Score
Exploit Status
References
https://www.wordfence.com/blog/2020/09/critical-vulnerabilities-patched-in-xcloner-backup-and-restore-plugin/
https://wpscan.com/vulnerability/10412
http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html
https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2020-35948
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
Wordfence | 2020-09-22 13:28:02 UTC |
Timeline
-
Added to KEVIntel
-
CVE ID Reserved
-
CVE Published to Public