CVE-2023-54346

Published: Mag 05, 2026 Last Modified: Mag 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,7
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

WordPress Plugin Backup Migration 1.2.8 contains an information disclosure vulnerability that allows unauthenticated attackers to download complete database backups by accessing predictable file paths. Attackers can enumerate backup directories through configuration files and complete logs, then construct direct download URLs to retrieve sensitive backup archives containing full database dumps.

538

Insertion of Sensitive Information into Externally-Accessible File or Directory

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Files Or Directories
Applicable Platforms
All platforms may be affected
View CWE Details
https://backupbliss.com/
https://downloads.wordpress.org/plugin/backup-backup.1.2.8.zip
https://www.exploit-db.com/exploits/51445
https://www.vulncheck.com/advisories/wordpress-plugin-backup-migration-unauthen…