CVE-2023-6266

HIGH EXPLOITED NUCLEI

WordPress Backup Migration <1.3.6 - Info Disclosure

Title source: llm

Description

The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.

Nuclei Templates (1)

WordPress Backup Migration <= 1.3.6 - Path Traversal
HIGHVERIFIEDby riteshs4hu
Shodan: http.html:"backup-migration"
FOFA: body="backup-migration"

Scores

CVSS v3 7.5
EPSS 0.2677
EPSS Percentile 96.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-06-03
CWE
CWE-200 CWE-552
Status published
Products (2)
backupbliss/backup_migration < 1.3.6
inisev/BackupBliss – Backup & Migration with Free Cloud Storage < 1.3.6
Published Jan 11, 2024
Tracked Since Feb 18, 2026