CVE-2026-6663
Received Received - Intake
Remote Code Execution in GWD Connect WordPress Plugin

Publication date: 2026-05-12

Last updated on: 2026-05-12

Assigner: Wordfence

Description
The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key has not been configured, which is the default state. This makes it possible for unauthenticated attackers - on unregistered installations only, in certain environments - to execute arbitrary code on the server via the update_agent action, which writes attacker-supplied PHP code to the agent file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-12
Last Modified
2026-05-12
Generated
2026-05-12
AI Q&A
2026-05-12
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The GWD Connect plugin for WordPress has a vulnerability in all versions up to and including 2.9 where certain standalone agent endpoints (gwd-backup.php and gwd-logs.php) do not verify authentication if the API key is not configured, which is the default setting.

This lack of authorization allows unauthenticated attackers, but only on unregistered installations and in certain environments, to execute arbitrary code on the server by using the update_agent action. This action writes attacker-supplied PHP code to the agent file, enabling limited code execution.


How can this vulnerability impact me? :

This vulnerability can allow unauthenticated attackers to execute arbitrary PHP code on the server hosting the vulnerable WordPress plugin.

Such code execution could lead to unauthorized changes, potential data compromise, or further exploitation of the server, although the impact is limited by the conditions that the installation must be unregistered and the environment must allow this behavior.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart