Home

Description

The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.

PUBLISHED Reserved 2025-10-10 | Published 2025-10-15 | Updated 2025-10-15 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Product status

Default status
unaffected

*
affected

Credits

neworder finder

References

wordpress.org/plugins/is-human/ product

www.exploit-db.com/exploits/17299 exploit

web.archive.org/...te-command-execution-attack-detected.html technical-description

www.trustwave.com/...mote-command-injection-attack-detected/ technical-description

www.vulncheck.com/...ress-plugin-is-human-eval-injection-rce third-party-advisory

cve.org (CVE-2011-10033)

nvd.nist.gov (CVE-2011-10033)

Download JSON