The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Denial of Service in all versions up to, and including, 1.2.5. This is due to direct access of the backuply/restore_ins.php file and. This makes it possible for unauthenticated attackers to make excessive requests that result in the server running out of resources.
References
Configurations
History
15 Feb 2024, 19:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1f955d88-ab4c-4cf4-a23b-91119d412716?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/changeset/3033242/backuply/trunk/restore_ins.php - Patch | |
First Time |
Softaculous backuply
Softaculous |
|
CPE | cpe:2.3:a:softaculous:backuply:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-834 |
09 Feb 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-09 05:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-0842
Mitre link : CVE-2024-0842
CVE.ORG link : CVE-2024-0842
JSON object : View
Products Affected
softaculous
- backuply
CWE
CWE-834
Excessive Iteration