The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Denial of Service in all versions up to, and including, 1.2.5. This is due to direct access of the backuply/restore_ins.php file and. This makes it possible for unauthenticated attackers to make excessive requests that result in the server running out of resources.
References
Configurations
History
15 Feb 2024, 19:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:softaculous:backuply:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-834 | |
References | () https://plugins.trac.wordpress.org/changeset/3033242/backuply/trunk/restore_ins.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1f955d88-ab4c-4cf4-a23b-91119d412716?source=cve - Third Party Advisory | |
First Time |
Softaculous backuply
Softaculous |
09 Feb 2024, 14:31
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Feb 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-09 05:15
Updated : 2024-02-15 19:11
NVD link : CVE-2024-0842
Mitre link : CVE-2024-0842
CVE.ORG link : CVE-2024-0842
JSON object : View
Products Affected
softaculous
- backuply
CWE
CWE-834
Excessive Iteration