HTTP: Wordpress is_human Plugin Remote Command Injection
This signature detects attempts to exploit a command injection vulnerability in the WordPress is_human plugin. It is due to insufficient validation of user-supplied input. A successful attack can lead to execute arbitrary commands in the context of the application.
Extended Description
The 'is_human()' plugin for Wordpress is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Attackers can exploit this issue to execute arbitrary commands in the context of the application. is_human() versions 1.4.2 and prior are vulnerable.
Affected Products
Wordpress is_human()_plugin
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Wordpress