Vulnerability Description
The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_download_backup function. This makes it possible for attackers to have an account with only activate_plugins capability to access arbitrary files on the server, which can contain sensitive information. This only impacts sites hosted on Windows servers.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1615
- https://plugins.trac.wordpress.org/browser/backuply/trunk/main/ajax.php#L78
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/be3bd1f2-092c-47c4-a4e
- https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1615
- https://plugins.trac.wordpress.org/browser/backuply/trunk/main/ajax.php#L78
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/be3bd1f2-092c-47c4-a4e
FAQ
What is CVE-2024-2294?
CVE-2024-2294 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_do...
How severe is CVE-2024-2294?
CVE-2024-2294 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2294?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.