The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-13T17:01:08.575Z
Reserved: 2023-03-07T14:47:40.224Z
Link: CVE-2022-4932

Updated: 2024-08-03T01:55:46.036Z

Status : Modified
Published: 2023-03-07T15:15:10.980
Modified: 2024-11-21T07:36:16.787
Link: CVE-2022-4932

No data.