Filtered by vendor Backupbliss
Subscribe
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-6750 | 1 Backupbliss | 1 Clone | 2024-09-04 | N/A | 7.5 HIGH |
The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path. | |||||
CVE-2023-6266 | 1 Backupbliss | 1 Backup Migration | 2024-02-05 | N/A | 7.5 HIGH |
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more. | |||||
CVE-2023-6972 | 1 Backupbliss | 1 Backup Migration | 2024-02-05 | N/A | 9.8 CRITICAL |
The Backup Migration plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.9 via the 'content-backups' and 'content-name', 'content-manifest', or 'content-bmitmp' and 'content-identy' HTTP headers. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible. | |||||
CVE-2023-7002 | 1 Backupbliss | 1 Backup Migration | 2024-02-05 | N/A | 7.2 HIGH |
The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system. | |||||
CVE-2023-6971 | 1 Backupbliss | 1 Backup Migration | 2024-02-05 | N/A | 9.8 CRITICAL |
The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the 'content-dir' HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server's php.ini is configured with 'allow_url_include' set to 'on'. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP. | |||||
CVE-2023-6553 | 1 Backupbliss | 1 Backup Migration | 2024-02-05 | N/A | 9.8 CRITICAL |
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server. | |||||
CVE-2023-0958 | 7 Backupbliss, Copy-delete-posts, Inisev and 4 more | 11 Backup Migration, Clone, Duplicate Post and 8 more | 2024-02-05 | N/A | 6.5 MEDIUM |
Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability. | |||||
CVE-2021-36884 | 1 Backupbliss | 1 Backup Migration | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Authenticated Persistent Cross-Site Scripting (XSS) vulnerability discovered in WordPress Backup Migration plugin <= 1.1.5 versions. |