The WP Database Backup plugin for WordPress is vulnerable to OS Command Injection in versions before 5.2 via the mysqldump function. This vulnerability allows unauthenticated attackers to execute arbitrary commands on the host operating system.
References
| Link | Resource |
|---|---|
| https://blog.sucuri.net/2019/06/os-command-injection-in-wp-database-backup.html | Exploit Third Party Advisory |
| https://packetstormsecurity.com/files/153781/ | Exploit Third Party Advisory |
| https://plugins.trac.wordpress.org/changeset/2078035/wp-database-backup | Patch |
| https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_db_backup_rce.rb | Exploit |
| https://www.wordfence.com/blog/2019/05/os-command-injection-vulnerability-patched-in-wp-database-backup-plugin/ | Exploit Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/d21cf285-9d75-43a2-9e81-67116f0bf896?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-25 03:15
Updated : 2025-08-11 18:57
NVD link : CVE-2019-25224
Mitre link : CVE-2019-25224
CVE.ORG link : CVE-2019-25224
JSON object : View
Products Affected
wpseeds
- wp_database_backup
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
