Critical code_pattern
WP Database Backup – Unlimited Database & Files Backup by Backup for WP Resolved · false_positive_documented_feature
2d ago
| Slug | wp-database-backup |
|---|---|
| Pattern | wpconfig_creds_string |
| Kind | builtin |
| Version | 7.10 |
| Hit count | 10 |
| First hit |
|
| Explanation | plugin source contains a literal string `"DB_NAME"` / `"DB_USER"` / `"DB_PASSWORD"` / `"DB_HOST"` — the credential constants are referenced by name only when something is parsing wp-config.php to harvest the database password, which legitimate plugins essentially never do. Signature of the June 2024 credential-stuffing payload that walked the filesystem looking for wp-config files and exfiltrated DB creds. wp-config itself uses these as constants (no surrounding quotes); plugin code that quotes them is the malicious shape. |
View raw JSON
{
"slug": "wp-database-backup",
"pattern": "wpconfig_creds_string",
"kind": "builtin",
"version": "7.10",
"hit_count": 10,
"first_hit": {
"file": "includes/admin/class-wpdbbkp-restore.php",
"line": 180,
"snippet": "preg_match(\"/'DB_NAME',\\s*'(.*)?'/\", $config_file, $matches);"
},
"explanation": "plugin source contains a literal string `\"DB_NAME\"` / `\"DB_USER\"` / `\"DB_PASSWORD\"` / `\"DB_HOST\"` \u2014 the credential constants are referenced by name only when something is parsing wp-config.php to harvest the database password, which legitimate plugins essentially never do. Signature of the June 2024 credential-stuffing payload that walked the filesystem looking for wp-config files and exfiltrated DB creds. wp-config itself uses these as constants (no surrounding quotes); plugin code that quotes them is the malicious shape."
}