CVE-2023-6266
HIGH EXPLOITED NUCLEIWordPress Backup Migration <1.3.6 - Info Disclosure
Title source: llmDescription
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
Nuclei Templates (1)
WordPress Backup Migration <= 1.3.6 - Path Traversal
HIGHVERIFIEDby riteshs4hu
Shodan:
http.html:"backup-migration"
FOFA:
body="backup-migration"
References (4)
Scores
CVSS v3
7.5
EPSS
0.2677
EPSS Percentile
96.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-06-03
CWE
CWE-200
CWE-552
Status
published
Products (2)
backupbliss/backup_migration
< 1.3.6
inisev/BackupBliss – Backup & Migration with Free Cloud Storage
< 1.3.6
Published
Jan 11, 2024
Tracked Since
Feb 18, 2026