Vulnerability Description
The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inpsyde | Backwpup | < 4.0.3 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3039678/backwpupPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/3039678/backwpupPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7Third Party Advisory
FAQ
What is CVE-2023-5775?
CVE-2023-5775 is a vulnerability with a CVSS score of 2.2 (LOW). The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup ...
How severe is CVE-2023-5775?
CVE-2023-5775 has been rated LOW with a CVSS base score of 2.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5775?
Check the references section above for vendor advisories and patch information. Affected products include: Inpsyde Backwpup.