Bruteforce Vulnerability in WordPress Plugin Could Leak Sensitive Backup Information
CVE-2024-7315
Currently unrated
Key Information:
- Vendor
- Migration, Backup, Staging WordPress plugin
- Status
- Migration, Backup, Staging
- Vendor
- CVE Published:
- 2 October 2024
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups.
Affected Version(s)
Migration, Backup, Staging 0.9.103 < 0.9.106
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)
Credit
Dmitrii Ignatyev
WPScan