The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Oct 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012. | |
Title | WordPress Plugin is-human <= v1.4.2 Eval Injection RCE | |
Weaknesses | CWE-95 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-15T01:23:46.757Z
Reserved: 2025-10-10T13:59:10.279Z
Link: CVE-2011-10033

No data.

Status : Received
Published: 2025-10-15T02:15:31.020
Modified: 2025-10-15T02:15:31.020
Link: CVE-2011-10033

No data.

No data.