Directory Traversal Vulnerability in Backuply Plugin for WordPress
CVE-2024-0697

4.9MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
27 January 2024

Summary

The Backuply plugin for WordPress is exposed to a Directory Traversal vulnerability due to a flaw in the backuply_get_jstree function, specifically via the node_id parameter. This allows users with administrator privileges to access and read sensitive files on the server, which could lead to unauthorized disclosure of personal or confidential data. This issue affects all versions up to and including 1.2.3, prompting the need for immediate attention and patching.

Affected Version(s)

Backuply – Backup, Restore, Migrate and Clone * <= 1.2.3

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bence Szalai
.