Description
The WordPress pluginĀ is-human <= v1.4.2 containsĀ an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
INFO
Published Date :
2025-10-15T01:23:46.757Z
Last Modified :
2025-10-15T18:49:41.245Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2011-10033 vulnerability.
Vendors | Products |
---|---|
Is-human |
|
Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2011-10033.