Remote PHP Code Execution Vulnerability in W3 Total Cache Plugin by WordPress
CVE-2013-2010
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 12 February 2020
Badges
Summary
The W3 Total Cache Plugin for WordPress version 0.9.2.8 contains a vulnerability that allows remote attackers to execute arbitrary PHP code. This security flaw could be exploited by manipulating specific inputs, leading to unauthorized access and control over the affected server. It is critical for users of this plugin to assess their installations and apply recommended security patches to mitigate potential risks associated with this vulnerability.
Affected Version(s)
W3 Total Cache Plugin 0.9.2.8
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
82% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved