Command Execution Vulnerability in XCloner Plugin for WordPress
CVE-2015-4336
Currently unrated
Summary
The XCloner plugin for WordPress version 3.1.2 contains a command execution vulnerability due to improper handling of user input in the cloner.functions.php file. This flaw allows remote authenticated users to execute arbitrary commands by leveraging crafted filenames that include shell metacharacters. The exploitation can be achieved through features like backup comments, which can lead to unauthorized command execution, compromising the integrity and security of affected WordPress installations.
References
Timeline
Vulnerability published
Vulnerability Reserved