Arbitrary File Upload Vulnerability in WP STAGING WordPress Backup Plugin
CVE-2024-3412

9.1CRITICAL

Key Information:

Summary

The WP STAGING WordPress Backup Plugin – Migration Backup Restore is susceptible to arbitrary file upload vulnerabilities due to inadequate file type validation in the wpstg_processing AJAX action. This flaw affects all versions up to and including 3.4.3, allowing authenticated attackers with administrator-level access to upload unauthorized files to the server. Such actions could potentially lead to remote code execution, compromising the security of the affected WordPress site.

Affected Version(s)

WP STAGING WordPress Backup Plugin – Migration Backup Restore * <= 3.4.3

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

haidv35
.