[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fH7_clE4TR9W7IL3KS44syKttrLmtOjT08fzR_n87Tyc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-f8035ed9-d267-44da-9de4-cf3d6ece7059-wp-database-backup","wp-database-backup-unauthenticated-settings-update-to-remote-code-execution","WP Database Backup \u003C= 5.1.2 - Unauthenticated Settings Update to Remote Code Execution","The WP Database Backup plugin for WordPress is vulnerable to unauthenticated settings update that can lead to remote code execution via the wpsetting functionality in versions up to, and including, 5.1.2. This makes it possible for unauthenticated attackers to inject malicious code into settings that will execute when a back-up is triggered by an unsuspecting user.","wp-database-backup",null,"\u003C=5.1.2","5.1.3","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Missing Authorization","2019-03-24 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff8035ed9-d267-44da-9de4-cf3d6ece7059?source=api-prod",1766]