WordPress plugin vulnerable to SQL Injection via user-supplied parameter
CVE-2024-8669
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 14 September 2024
What is CVE-2024-8669?
The Backuply plugin for WordPress, specifically versions up to and including 1.3.4, contains a vulnerability that allows authenticated users with administrator-level access to perform SQL Injection attacks. This vulnerability arises from inadequate escaping of the 'options' parameter in the backuply_wp_clone_sql() function, permitting attackers to append additional SQL queries to existing ones. As a result, attackers can exploit this weakness to extract sensitive data from the database, potentially compromising the security of the entire WordPress installation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Backuply β Backup, Restore, Migrate and Clone * <= 1.3.4
References
CVSS V3.1
Timeline
Vulnerability published