The Backup Migration plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.9 via the ‘content-backups’ and ‘content-name’, ‘content-manifest’, or ‘content-bmitmp’ and ‘content-identy’ HTTP headers. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.
CPE | Name | Operator | Version |
---|---|---|---|
backup_migration | lt | 1.4.0 |
plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/backup-heart.php
plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/bypasser.php
plugins.trac.wordpress.org/changeset/3012745/backup-backup
www.wordfence.com/threat-intel/vulnerabilities/id/0a3ae696-f67d-4ed2-b307-d2f36b6f188c?source=cve