Migrate - RCE (CVE-2023-6553)
4Exploiting IPs reported
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
CrowdSec analysis
CVE-2023-6553 is a critical vulnerability in the Backup Migration plugin for WordPress that allows unauthenticated remote code execution via a component responsible for managing backup operations.
CrowdSec has been tracking this vulnerability and its exploits since 8th of January 2024.
Data from the CrowdSec community indicates that exploitation of CVE-2023-6553 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2023-6553 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2023-6553 is currently experiencing high visibility and active exploitation across the internet.
Exploitation attempts would typically involve requests directed at paths including /includes/backup-heart.php
.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.