CVE-2020-35948
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/01/2021
Last modified:
22/02/2022
Description
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xcloner:xcloner:*:*:*:*:*:wordpress:*:* | 4.2.1 (including) | 4.2.13 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html
- https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2020-35948
- https://wpscan.com/vulnerability/10412
- https://www.wordfence.com/blog/2020/09/critical-vulnerabilities-patched-in-xcloner-backup-and-restore-plugin/



