The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:11:35.712Z
Reserved: 2024-01-18T19:14:05.933Z
Link: CVE-2024-0697

No data.

Status : Modified
Published: 2024-01-27T05:15:08.470
Modified: 2024-11-21T08:47:10.177
Link: CVE-2024-0697

No data.