#VU25674 Embedded malicious code (backdoor) in wpdefault
Published: February 28, 2020
Vulnerability identifier: #VU25674
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-506
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
wpdefault
wpdefault
Software vendor:
wpdefault
wpdefault
Description
The vulnerability allows a remote attacker to skim payment data from Woocommerce stores.
The vulnerability exists due to presence of embedded malicious functionality in the application code (aka backdoor) within the "wpdefault.php" file that allows a remote attacker to gain unauthorized access to the application.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.