CVE-2023-6553
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers running the vulnerable Backup Migration plugin. Attackers can exploit improper input validation in the backup-heart.php file to include malicious files and achieve remote code execution. All WordPress sites using Backup Migration plugin versions 1.3.7 and earlier are affected.
💻 Affected Systems
- WordPress Backup Migration plugin
📦 What is this software?
Backup Migration by Backupbliss
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise allowing attackers to install malware, steal sensitive data, deface websites, or use the server as part of a botnet.
Likely Case
Website defacement, data theft, cryptocurrency mining, or backdoor installation for persistent access.
If Mitigated
Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.8 or later
Vendor Advisory: https://wordpress.org/plugins/backup-backup/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Backup Migration' and click 'Update Now'. 4. Verify version is 1.3.8 or higher.
🔧 Temporary Workarounds
Disable vulnerable plugin
linuxTemporarily disable the Backup Migration plugin until patched
mv /path/to/wp-content/plugins/backup-backup /path/to/wp-content/plugins/backup-backup.disabled
Block access to vulnerable endpoint
allUse web server configuration to block access to /includes/backup-heart.php
# For Apache: add to .htaccess
<Files "backup-heart.php">
Order Allow,Deny
Deny from all
</Files>
# For Nginx: add to server block
location ~* /includes/backup-heart\.php$ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Immediately disable the Backup Migration plugin completely
- Implement a web application firewall (WAF) with rules to block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Backup Migration → Version number. If version is 1.3.7 or lower, you are vulnerable.
Check Version:
grep -r "Version:" /path/to/wp-content/plugins/backup-backup/backup-backup.php | cut -d: -f2
Verify Fix Applied:
After updating, verify version shows 1.3.8 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-content/plugins/backup-backup/includes/backup-heart.php with suspicious parameters
- Unusual PHP process execution or file writes in WordPress directories
Network Indicators:
- POST requests to backup-heart.php with encoded payloads
- Sudden increase in traffic to the vulnerable endpoint
SIEM Query:
source="web_server_logs" AND uri="*backup-heart.php*" AND (method="POST" OR params="*include*" OR params="*php://*" OR params="*data://*")
🔗 References
- http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L118
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L38
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L62
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L64
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3006541%40backup-backup&new=3006541%40backup-backup&sfp_email=&sfph_mail=
- https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3511ba64-56a3-43d7-8ab8-c6e40e3b686e?source=cve
- http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L118
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L38
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L62
- https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.7/includes/backup-heart.php#L64
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3006541%40backup-backup&new=3006541%40backup-backup&sfp_email=&sfph_mail=
- https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3511ba64-56a3-43d7-8ab8-c6e40e3b686e?source=cve