The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.13 via the exposed process stats file during the backup process. This makes it possible for unauthenticated attackers to obtain an archive file name and download the site's backup.
References
Configurations
History
08 Nov 2024, 21:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:everestthemes:everest_backup:*:*:*:*:*:wordpress:*:* | |
First Time |
Everestthemes
Everestthemes everest Backup |
|
References | () https://plugins.trac.wordpress.org/browser/everest-backup/tags/2.2.13/inc/classes/class-backup-directory.php#L514 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/9b871957-a2b3-492f-b461-7040d9098b2b?source=cve - Third Party Advisory |
06 Nov 2024, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-06 00:15
Updated : 2024-11-08 21:21
NVD link : CVE-2024-10028
Mitre link : CVE-2024-10028
CVE.ORG link : CVE-2024-10028
JSON object : View
Products Affected
everestthemes
- everest_backup
CWE
CWE-922
Insecure Storage of Sensitive Information