CVE-2023-6750

The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*

History

11 Jan 2024, 20:01

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - Exploit, Third Party Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*
First Time Backupbliss
Backupbliss clone
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) El complemento Clone de WordPress anterior a 2.4.3 utiliza archivos de búfer para almacenar información de copia de seguridad en progreso, que se almacena en una ruta de archivo definida estáticamente y de acceso público.

08 Jan 2024, 19:30

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-08 19:15

Updated : 2024-01-11 20:01


NVD link : CVE-2023-6750

Mitre link : CVE-2023-6750

CVE.ORG link : CVE-2023-6750


JSON object : View

Products Affected

backupbliss

  • clone