Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| migrate | Backup Migration | * ~ 1.3.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution | https://github.com/Chocapikk/CVE-2023-6553 | POC Details |
| 2 | None | https://github.com/motikan2010/CVE-2023-6553-PoC | POC Details |
| 3 | None | https://github.com/kiddenta/CVE-2023-6553 | POC Details |
| 4 | None | https://github.com/julienbrs/exploit-CVE-2023-6553 | POC Details |
| 5 | CVE-2023-6553 exploit script | https://github.com/cc3305/CVE-2023-6553 | POC Details |
| 6 | Exploit Development for CVE-2023-6553 on Backup Plugin in Wordpress | https://github.com/Harshit-Mashru/CVE-2023-6553 | POC Details |
| 7 | The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated threat actors to easily execute code on the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-6553.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet