CVE-2026-6663

GWD Connect <= 2.9 - Unauthenticated Limited Code Execution via update_agent

mediumMissing Authorization
4.8
CVSS Score
4.8
CVSS Score
medium
Severity
Unpatched
Patched in
N/A
Time to patch

Description

The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key has not been configured, which is the default state. This makes it possible for unauthenticated attackers - on unregistered installations only, in certain environments - to execute arbitrary code on the server via the update_agent action, which writes attacker-supplied PHP code to the agent file.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Low
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=2.9
PublishedMay 11, 2026
Last updatedMay 12, 2026
Affected plugingraphic-web-design-inc

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.