WordPress Backup and Migrate Plugin – Backup Guard < 1.0.3 - Arbitrary File Upload
The WordPress Backup and Migrate Plugin – Backup Guard plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the backup_guard_get_import_backup() function in versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.
This vulnerability is a high severity with CVSS 8.8 Remote Code Execution issue affecting the Plugin JetBackup – Backup, Restore & Migrate. It affects Versions before 1.0.3 and is fixed in 1.0.3.
the tracked vulnerability is tracked for the Plugin JetBackup – Backup, Restore & Migrate as high severity with CVSS 8.8. The affected range is Versions before 1.0.3. Update JetBackup – Backup, Restore & Migrate to 1.0.3 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
backup
View on wordpress.org
|
| CVE | No linked CVE entry. |
| Patched Versions |
1.0.3
|
| Affected Versions |
Versions before 1.0.3
|
Related CVEs for JetBackup – Backup, Restore & Migrate
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
JetBackup <= 2.0.9.7 - Sensitive Information Exposure via Directory Listing
JetBackup – WP Backup, Migrate & Restore <= 1.3.9 - Cross-Site Request Forgery to Arbitrary File Upload
Backup Guard <= 1.5.9 - Authenticated Arbitrary File Upload
BackupGuard <= 1.1.46 - Reflected Cross-Site Scripting
Backup Guard <= 1.1.46 - Cross-Site Scripting
Backup Guard <= 1.6.9 - Authenticated (Administrator+) Stored Cross-Site Scripting
JetBackup – WP Backup, Migrate & Restore <= 1.4.1 - Missing Authorization to Unauthorized Backup Location Change
JetBackup <= 3.1.19.8 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal in 'fileName' Parameter
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more