CVE-2026-6663
GWD Connect <= 2.9 - Unauthenticated Limited Code Execution via update_agent
mediumMissing Authorization
4.8
CVSS Score
4.8
CVSS Score
medium
Severity
Unpatched
Patched in
N/A
Time to patch
Description
The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key has not been configured, which is the default state. This makes it possible for unauthenticated attackers - on unregistered installations only, in certain environments - to execute arbitrary code on the server via the update_agent action, which writes attacker-supplied PHP code to the agent file.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:NAttack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Low
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=2.9PublishedMay 11, 2026
Last updatedMay 12, 2026
Affected plugingraphic-web-design-inc
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.