QID 730611

Date Published: 2022-09-19

QID 730611: WordPress BackupBuddy Plugin Arbitrary File Read Vulnerability

The plugin is affected by a Directory Traversal attack, allowing unauthenticated attackers to access arbitrary files on the web server.

Affected Versions:
BackupBuddy versions 8.5.8.0 through 8.7.4.1

QID Detection Logic (Unauthenticated): This QID checks for vulnerable BackBuddy plugin by sending a crafted payload to the webserver that tries to read the /etc/passwd file.

Successful exploitation of the vulnerability may allow remote attackers to read sensitive files on a vulnerable webserver.

  • CVSS V3 rated as Critical - 9.1 severity.
  • CVSS V2 rated as Critical - 9.4 severity.
  • Solution
    Customers are advised to immediately upgrade to at least version 8.7.5 or higher. For more information please refer to CVE-2022-31474

    CVEs related to QID 730611

    Software Advisories
    Advisory ID Software Component Link
    Critical URL Logo ithemes.com/blog/wordpress-vulnerability-report-special-edition-september-6-2022-backupbuddy/