Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total6
Critical0
High4
Medium1
Reset
Showing 1-6 of 6 records
Threat Entry Updated 2026-04-14

CVE-2026-6227 - Backwpup Plugin

The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5.6.6 due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual…

PLUGIN Backwpup

CVE-2026-6227

HIGH CVSS 7.2 2026-04-14
Threat Entry Updated 2026-02-19

CVE-2025-15041 - Backwpup Plugin

The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the save_site_option() function in all versions up to, and including, 5.6.2. This makes it possible for authenticated attackers, with level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Backwpup

CVE-2025-15041

HIGH CVSS 7.2 2026-02-19
Threat Entry Updated 2025-04-10

CVE-2023-5505 - Backwpup Plugin

The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the job-specific backup folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to…

PLUGIN Backwpup

CVE-2023-5505

MEDIUM CVSS 6.8 2024-08-17
Threat Entry Updated 2025-04-11

CVE-2023-7164 - Backwpup Plugin

The BackWPup WordPress plugin before 4.0.4 does not prevent Directory Listing in its temporary backup folder, allowing unauthenticated attackers to download backups of a site's database.

PLUGIN Backwpup

CVE-2023-7164

HIGH CVSS 7.5 2024-04-08
Threat Entry Updated 2025-02-05

CVE-2023-5775 - Backwpup Plugin

The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.

PLUGIN Backwpup

CVE-2023-5775

LOW CVSS 2.2 2024-02-26
Threat Entry Updated 2024-11-21

CVE-2023-5504 - Backwpup Plugin

The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to…

PLUGIN Backwpup

CVE-2023-5504

HIGH CVSS 8.7 2024-01-11
Scroll to top