The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
Metrics
Affected Vendors & Products
References
History
Wed, 05 Feb 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Inpsyde
Inpsyde backwpup |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Inpsyde
Inpsyde backwpup |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-02T08:07:32.667Z
Reserved: 2023-10-25T22:23:15.252Z
Link: CVE-2023-5775

Updated: 2024-08-02T08:07:32.667Z

Status : Analyzed
Published: 2024-02-26T16:27:49.230
Modified: 2025-02-05T21:31:23.983
Link: CVE-2023-5775

No data.