Directory Traversal Vulnerability in Backuply Plugin for WordPress
CVE-2024-0697
6.5MEDIUM
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 27 January 2024
What is CVE-2024-0697?
The Backuply plugin for WordPress is exposed to a Directory Traversal vulnerability due to a flaw in the backuply_get_jstree function, specifically via the node_id parameter. This allows users with administrator privileges to access and read sensitive files on the server, which could lead to unauthorized disclosure of personal or confidential data. This issue affects all versions up to and including 1.2.3, prompting the need for immediate attention and patching.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Backuply β Backup, Restore, Migrate and Clone * <= 1.2.3
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Bence Szalai