Local File Exposure in WP Database Backup Plugin for WordPress
CVE-2020-7241
7.5HIGH
Summary
The WP Database Backup plugin for WordPress, through version 5.5, exhibits a vulnerability that allows unauthorized access to stored backup archives. By default, the plugin saves these archives in the directory wp-content/uploads/db-backup/. Attackers can exploit this by predicting IDs or date strings formatted as 2020_{0..1}{0..2}_{0..3}{0..9}, or through guessing UNIX timestamps. Consequently, they can craft HTTPS requests to access ZIP files, potentially leading to data leakage.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved