Home

Description

The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key has not been configured, which is the default state. This makes it possible for unauthenticated attackers - on unregistered installations only, in certain environments - to execute arbitrary code on the server via the update_agent action, which writes attacker-supplied PHP code to the agent file.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-12 | Updated 2026-05-12 | Assigner Wordfence




MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-12:Discovered
2026-05-11:Disclosed

Credits

Athiwat Tiprasaharn finder

References

www.wordfence.com/...-d6ce-41bd-8a45-e252fb4ba419?source=cve

plugins.trac.wordpress.org/...ackup.php?marks=1991,2002,2548

plugins.trac.wordpress.org/...gwd-logs.php?marks=398,403,851

cve.org (CVE-2026-6663)

nvd.nist.gov (CVE-2026-6663)

Download JSON