The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-01-27T04:31:29.644Z

Updated: 2025-06-17T21:29:16.393Z

Reserved: 2024-01-18T19:14:05.933Z

Link: CVE-2024-0697

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.712Z

cve-icon NVD

Status : Modified

Published: 2024-01-27T05:15:08.470

Modified: 2024-11-21T08:47:10.177

Link: CVE-2024-0697

cve-icon Redhat

No data.