CVE-2020-35948
📋 TL;DR
This vulnerability in the XCloner WordPress plugin allows authenticated attackers to modify arbitrary files, including critical PHP files like wp-config.php. This can lead to remote code execution or database compromise. WordPress sites using vulnerable XCloner plugin versions are affected.
💻 Affected Systems
- WordPress XCloner Backup and Restore Plugin
📦 What is this software?
Xcloner by Xcloner
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover through remote code execution, database compromise, and potential lateral movement to other systems.
Likely Case
Unauthorized file modification leading to backdoor installation, data theft, or site defacement.
If Mitigated
Limited impact if proper access controls, file permissions, and monitoring are in place.
🎯 Exploit Status
Multiple public exploit scripts available, requires authenticated WordPress user access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.13 and later
Vendor Advisory: https://wpscan.com/vulnerability/10412
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Update XCloner Backup and Restore plugin to version 4.2.13 or higher. 4. Verify update completed successfully.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable XCloner plugin until patched
wp plugin deactivate xcloner-backup-and-restore
Restrict file permissions
linuxSet strict permissions on wp-config.php and other critical files
chmod 400 wp-config.php
chown root:root wp-config.php
🧯 If You Can't Patch
- Remove XCloner plugin completely and use alternative backup solution
- Implement strict access controls and monitor for suspicious file modification attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel for XCloner plugin version. If version is below 4.2.13, system is vulnerable.
Check Version:
wp plugin get xcloner-backup-and-restore --field=version
Verify Fix Applied:
Confirm XCloner plugin version is 4.2.13 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file modification attempts in wp-content/plugins/xcloner-backup-restore/ logs
- Suspicious POST requests to xcloner_restore.php
Network Indicators:
- HTTP requests to /wp-content/plugins/xcloner-backup-restore/xcloner_restore.php with file write parameters
SIEM Query:
source="wordpress.logs" AND (uri="/wp-content/plugins/xcloner-backup-restore/xcloner_restore.php" AND method="POST")
🔗 References
- http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html
- https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2020-35948
- https://wpscan.com/vulnerability/10412
- https://www.wordfence.com/blog/2020/09/critical-vulnerabilities-patched-in-xcloner-backup-and-restore-plugin/
- http://packetstormsecurity.com/files/163336/WordPress-XCloner-4.2.12-Remote-Code-Execution.html
- https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2020-35948
- https://wpscan.com/vulnerability/10412
- https://www.wordfence.com/blog/2020/09/critical-vulnerabilities-patched-in-xcloner-backup-and-restore-plugin/