The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
References
Configurations
History
05 Feb 2025, 21:31
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset/3039678/backwpup - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7e-5903ad50cc13?source=cve - Third Party Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Inpsyde
Inpsyde backwpup |
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset/3039678/backwpup - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7e-5903ad50cc13?source=cve - |
26 Feb 2024, 16:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-26 16:27
Updated : 2025-02-05 21:31
NVD link : CVE-2023-5775
Mitre link : CVE-2023-5775
CVE.ORG link : CVE-2023-5775
JSON object : View
Products Affected
inpsyde
- backwpup
CWE