CVE-2023-6750

The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.
Configurations

Configuration 1 (hide)

cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - Exploit, Third Party Advisory

11 Jan 2024, 20:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Backupbliss
Backupbliss clone
References () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - () https://wpscan.com/vulnerability/fad9eefe-4552-4d20-a1fd-bb2e172ec8d7 - Exploit, Third Party Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*

08 Jan 2024, 19:30

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-08 19:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6750

Mitre link : CVE-2023-6750

CVE.ORG link : CVE-2023-6750


JSON object : View

Products Affected

backupbliss

  • clone