Lucene search

K
wpvulndbDmitrii IgnatyevWPVDB-ID:65A8CF83-D6CC-4D4C-A482-288A83A69879
HistoryJan 05, 2024 - 12:00 a.m.

WP STAGING WordPress Backup Plugin – Migration Backup Restore < 3.2.0 - Unauthorized Sensitive Data Exposure

2024-01-0500:00:00
Dmitrii Ignatyev
wpscan.com
2
wordpress
backup
migration
unauthorized access
sensitive data exposure
cache files

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.6%

Description The plugin allows access to cache files during the cloning process which provides unauthorized access to sensitive data

PoC

  1. When an admin creates a staging site, an attacker can capture a .cache file which reveals sensitive information including: DB_name, DB_tables, DB_columns. 2) These files can be accessed at these URLs during backup: - http://127.0.0.1/wordpress/wp-content/uploads/wp-staging/clone_options.cache - http://127.0.0.1/wordpress/wp-content/uploads/wp-staging/files_to_copy.cache
CPENameOperatorVersion
eq3.2.0

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.6%

Related for WPVDB-ID:65A8CF83-D6CC-4D4C-A482-288A83A69879