The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
History

Wed, 15 Oct 2025 01:45:00 +0000

Type Values Removed Values Added
Description The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
Title WordPress Plugin is-human <= v1.4.2 Eval Injection RCE
Weaknesses CWE-95
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-10-15T01:23:46.757Z

Reserved: 2025-10-10T13:59:10.279Z

Link: CVE-2011-10033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-15T02:15:31.020

Modified: 2025-10-15T02:15:31.020

Link: CVE-2011-10033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.