Arbitrary File Upload Vulnerability in WP STAGING WordPress Backup Plugin
CVE-2024-3412
9.1CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 29 May 2024
Summary
The WP STAGING WordPress Backup Plugin – Migration Backup Restore is susceptible to arbitrary file upload vulnerabilities due to inadequate file type validation in the wpstg_processing AJAX action. This flaw affects all versions up to and including 3.4.3, allowing authenticated attackers with administrator-level access to upload unauthorized files to the server. Such actions could potentially lead to remote code execution, compromising the security of the affected WordPress site.
Affected Version(s)
WP STAGING WordPress Backup Plugin – Migration Backup Restore * <= 3.4.3
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
haidv35