We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5396

Bears Backup <= 2.0.0 - Unauthenticated Remote Code Execution



Description

The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability check, nor validating user supplied input passed directly to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things. On WordPress sites running the Alone theme versions 7.8.4 and older, this can be chained with CVE-2025-5394 to install the Bears Backup plugin and achieve the same impact.

Reserved 2025-05-30 | Published 2025-07-17 | Updated 2025-07-17 | Assigner Wordfence


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

*
affected

Timeline

2025-07-16:Disclosed

Credits

Trương Hữu Phúc (truonghuuphuc) finder

References

www.wordfence.com/...-6d30-4930-b68b-9a04d93f5169?source=cve

themeforest.net/...urpose-nonprofit-wordpress-theme/15019939

cve.org (CVE-2025-5396)

nvd.nist.gov (CVE-2025-5396)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5396

Support options

Helpdesk Chat, Email, Knowledgebase