Description
WordPress Plugin BackUpWordPress is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system. WordPress Plugin BackUpWordPress versions 0.4.2b and below are vulnerable.
Remediation
Update to plugin version 1.0 or latest
References
http://www.exploit-db.com/exploits/4593/
http://packetstormsecurity.com/files/view/60611/backupword-rfi.txt
Related Vulnerabilities
WordPress Plugin Download Zip Attachments Arbitrary File Download (1.0.0)
WordPress Plugin WordPress Download Manager Security Bypass (2.7.2)
WordPress Plugin WP Maintenance Mode & Site Under Construction Security Bypass (1.8.1)
WordPress Plugin WP Statistics Cross-Site Scripting (12.6.5)
WordPress Plugin UserPro-Community and User Profile Cross-Site Scripting (4.9.33)