WordPress plugin vulnerable to SQL Injection via user-supplied parameter
CVE-2024-8669

9.1CRITICAL

What is CVE-2024-8669?

The Backuply plugin for WordPress, specifically versions up to and including 1.3.4, contains a vulnerability that allows authenticated users with administrator-level access to perform SQL Injection attacks. This vulnerability arises from inadequate escaping of the 'options' parameter in the backuply_wp_clone_sql() function, permitting attackers to append additional SQL queries to existing ones. As a result, attackers can exploit this weakness to extract sensitive data from the database, potentially compromising the security of the entire WordPress installation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Backuply – Backup, Restore, Migrate and Clone * <= 1.3.4

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.