The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the job-specific backup folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
History

Fri, 28 Feb 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Inpsyde
Inpsyde backwpup
CPEs cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*
Vendors & Products Inpsyde
Inpsyde backwpup

Mon, 19 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 17 Aug 2024 08:45:00 +0000

Type Values Removed Values Added
Description The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the job-specific backup folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
Title BackWPup <= 4.0.1 - Authenticated (Administrator+) Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-17T08:37:24.102Z

Updated: 2024-08-19T13:46:27.129Z

Reserved: 2023-10-10T18:41:25.972Z

Link: CVE-2023-5505

cve-icon Vulnrichment

Updated: 2024-08-19T13:46:24.128Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-17T09:15:07.160

Modified: 2025-02-28T22:37:56.503

Link: CVE-2023-5505

cve-icon Redhat

No data.