CVE-2023-54346
HIGH
8,7
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
WordPress Plugin Backup Migration 1.2.8 contains an information disclosure vulnerability that allows unauthenticated attackers to download complete database backups by accessing predictable file paths. Attackers can enumerate backup directories through configuration files and complete logs, then construct direct download URLs to retrieve sensitive backup archives containing full database dumps.
538
Insertion of Sensitive Information into Externally-Accessible File or Directory
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Files Or Directories
Applicable Platforms
All platforms may be affected
https://backupbliss.com/
https://downloads.wordpress.org/plugin/backup-backup.1.2.8.zip
https://www.exploit-db.com/exploits/51445
https://www.vulncheck.com/advisories/wordpress-plugin-backup-migration-unauthen…