The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | LOW |
Attack Vector | NETWORK |
Availability Impact | NONE |
Base Score | 6.5 |
Base Severity | MEDIUM |
Confidentiality Impact | HIGH |
Integrity Impact | HIGH |
Privileges Required | HIGH |
Scope | UNCHANGED |
User Interaction | NONE |
Vector String | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |
Exploitability Score | 1.2 |
Impact Score | 5.2 |
Source | [email protected] |
Type | Secondary |