QID 150570

Date Published: 2022-09-18

QID 150570: WordPress BackupBuddy Plugin: Arbitrary File Read Vulnerability (CVE-2022-31474)

The BackupBuddy plugin for WordPress is designed to make back-up management easy for WordPress site owners.

Affected versions of BackupBuddy plugin do not validate the URL parameter in "local-download" and/or "local-destination-id" AJAX action before using it and returning its content in HTTP response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc).

Affected versions:
BackupBuddy versions 8.5.8.0 through 8.7.4.1.

QID Detection Logic (Unauthenticated) :
This QID sends an HTTP GET request to access the server file /etc/passwd and based on the response confirms if the target is vulnerable.

Successful exploitation of the vulnerability may allow remote attackers to read sensitive files on the target server.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to BackupBuddy plugin 8.7.5 or later version to remediate this vulnerability.

    For more information regarding this vulnerability please refer BackupBuddy Security Advisory.

    CVEs related to QID 150570

    Software Advisories
    Advisory ID Software Component Link
    BackupBuddy Security Advisory URL Logo ithemes.com/blog/wordpress-vulnerability-report-special-edition-september-6-2022-backupbuddy/