Lucene search

K
wpexploitDmitrii IgnatyevWPEX-ID:65A8CF83-D6CC-4D4C-A482-288A83A69879
HistoryJan 05, 2024 - 12:00 a.m.

WP STAGING WordPress Backup Plugin – Migration Backup Restore < 3.2.0 - Unauthorized Sensitive Data Exposure

2024-01-0500:00:00
Dmitrii Ignatyev
38
wordpress
backup
plugin
unauthorized
sensitive data
exposure
capture
cache file
urls
backup
exploit

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.6%

Description The plugin allows access to cache files during the cloning process which provides unauthorized access to sensitive data

1) When an admin creates a staging site, an attacker can capture a `.cache` file which reveals sensitive information including: DB_name, DB_tables, DB_columns.
2) These files can be accessed at these URLs during backup: 
 - http://127.0.0.1/wordpress/wp-content/uploads/wp-staging/clone_options.cache
 - http://127.0.0.1/wordpress/wp-content/uploads/wp-staging/files_to_copy.cache

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.6%

Related for WPEX-ID:65A8CF83-D6CC-4D4C-A482-288A83A69879