Skip to main content

CVE-2025-5396: CWE-94 Improper Control of Generation of Code ('Code Injection') in Bearsthemes Bears Backup

Critical
VulnerabilityCVE-2025-5396cvecve-2025-5396cwe-94
Published: Thu Jul 17 2025 (07/17/2025, 01:44:54 UTC)
Source: CVE Database V5
Vendor/Project: Bearsthemes
Product: Bears Backup

Description

The Bears Backup plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.0. This is due to the bbackup_ajax_handle() function not having a capability check, nor validating user supplied input passed directly to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leverage to inject backdoors or create new administrative user accounts to name a few things. On WordPress sites running the Alone theme versions 7.8.4 and older, this can be chained with CVE-2025-5394 to install the Bears Backup plugin and achieve the same impact.

AI-Powered Analysis

AILast updated: 07/17/2025, 02:31:07 UTC

Technical Analysis

CVE-2025-5396 is a critical remote code execution (RCE) vulnerability affecting the Bears Backup plugin for WordPress, maintained by Bearsthemes. This vulnerability exists in all versions up to and including 2.0.0. The root cause is improper control of code generation (CWE-94) due to the bbackup_ajax_handle() function lacking both capability checks and validation of user-supplied input. Specifically, this function directly passes unvalidated input to PHP's call_user_func(), enabling unauthenticated attackers to execute arbitrary code on the server hosting the WordPress site. Exploitation can lead to severe consequences such as injecting persistent backdoors, creating new administrative users, or executing arbitrary commands, effectively compromising the confidentiality, integrity, and availability of the affected system. Additionally, on WordPress sites running the Alone theme versions 7.8.4 and older, this vulnerability can be chained with CVE-2025-5394 to first install the Bears Backup plugin and then exploit it, broadening the attack surface and impact. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical severity, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. No patches or fixes are currently listed, indicating that affected sites remain vulnerable until an update is released or mitigations are applied.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially those relying on WordPress for their web presence and using the Bears Backup plugin. Successful exploitation can lead to full system compromise, data breaches involving sensitive customer or business data, defacement of websites, and disruption of services. The ability to create administrative accounts or install backdoors can facilitate persistent access for attackers, enabling further lateral movement or data exfiltration. This is particularly critical for sectors such as finance, healthcare, government, and e-commerce, where data confidentiality and service availability are paramount and regulated under GDPR and other compliance frameworks. The lack of authentication and user interaction requirements means that attackers can remotely exploit this vulnerability at scale, increasing the risk of widespread attacks across European organizations. Furthermore, the chaining possibility with the Alone theme vulnerability increases the attack vectors, potentially impacting sites that do not initially have the Bears Backup plugin installed but use the vulnerable theme.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately audit their WordPress installations for the presence of the Bears Backup plugin and the Alone theme (versions 7.8.4 and older). If found, the plugin should be disabled or removed until a secure update is available. Restricting access to the WordPress admin AJAX endpoint (admin-ajax.php) via web application firewalls (WAFs) or IP whitelisting can help mitigate exploitation attempts by blocking unauthorized requests to the vulnerable function. Implementing strict input validation and capability checks at the application level, if custom development resources are available, can serve as a temporary safeguard. Monitoring web server and WordPress logs for unusual or unauthorized AJAX requests can aid in early detection of exploitation attempts. Organizations should also ensure that their WordPress core, themes, and plugins are kept up to date and consider deploying runtime application self-protection (RASP) solutions to detect and block malicious code execution. Finally, regular backups and incident response plans should be reviewed and tested to prepare for potential compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-30T16:17:17.008Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68785ceca83201eaace0cbd8

Added to database: 7/17/2025, 2:16:12 AM

Last enriched: 7/17/2025, 2:31:07 AM

Last updated: 7/17/2025, 11:35:12 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats