WordPress Plugin Vulnerabilities

BackWPup < 5.6.7 - Admin+ Local File Inclusion via 'block_name' Parameter

Description

The plugin is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual users permission to handle backups, which may then allow lower-level users to exploit this vulnerability.

Affects Plugins

Fixed in 5.6.7

References

Classification

Type
LFI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Pixel_DefaultBR
Verified
No

Timeline

Publicly Published
2026-04-13 (about 1 month ago)
Added
2026-04-13 (about 1 month ago)
Last Updated
2026-04-13 (about 1 month ago)

Other