Back

Critical RCE Vulnerabilities in WordPress Plugins Exposed

Severity: High (Score: 72.0)

Sources: Medium, Sentinelone, www.wordfence.com

Summary

Two critical vulnerabilities affecting WordPress plugins have been reported. CVE-2023-6553 targets the Backup Migration plugin (versions ≤1.3.7), allowing unauthenticated remote code execution through a Local File Inclusion flaw. The CVSS score for this vulnerability is 9.8, indicating its severity. The second vulnerability, CVE-2026-1830, affects the Quick Playground plugin (versions ≤1.3.1), enabling unauthenticated attackers to exploit insufficient authorization checks on REST API endpoints, leading to arbitrary file uploads and remote code execution. Both vulnerabilities pose significant risks, including full site takeover and data exfiltration. Security patches have been released for both plugins, urging users to update immediately. The vulnerabilities highlight the importance of proper input validation and access controls in plugin development. Key Points: • CVE-2023-6553 allows RCE via LFI in Backup Migration plugin (CVSS 9.8). • CVE-2026-1830 enables RCE through unauthorized REST API access in Quick Playground plugin. • Immediate updates are recommended to mitigate these critical vulnerabilities.

Key Entities

  • Zero-day Exploit (attack_type)
  • CVE-2026-1830 (cve)
  • T1505.003 - Web Shell (mitre_attack)
  • PHP (platform)
  • WordPress (platform)
  • Burp Suite (tool)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed