← Zuruck zu CVEs
CVE-2011-10033
N/ABeschreibung
The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht10/15/2025
Zuletzt geandert10/16/2025
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-95
Referenzen
https://web.archive.org/web/20120115212202/http://blog.spiderlabs.com/2012/01/honeypot-alert-is-human-wordpress-plugin-remote-command-execution-attack-detected.html(disclosure@vulncheck.com)
https://wordpress.org/plugins/is-human/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/17299(disclosure@vulncheck.com)
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-alert-more-wordpress-is_human-plugin-remote-command-injection-attack-detected/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/wordpress-plugin-is-human-eval-injection-rce(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.