First published: Tue Apr 02 2013(Updated: )
importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress allows remote attackers to bypass authentication via a crafted integer in the step parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BackupBuddy | =1.3.4 | |
BackupBuddy | =2.1.4 | |
BackupBuddy | =2.2.4 | |
BackupBuddy | =2.2.25 | |
BackupBuddy | =2.2.28 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2743 has been classified with a medium severity rating due to its potential for authentication bypass.
To fix CVE-2013-2743, update the BackupBuddy plugin to a version that has patched the vulnerability.
CVE-2013-2743 affects BackupBuddy versions 1.3.4, 2.1.4, 2.2.4, 2.2.25, and 2.2.28.
Yes, CVE-2013-2743 can be exploited by remote attackers to bypass authentication.
No, WordPress itself is not vulnerable to CVE-2013-2743; the vulnerability exists specifically within certain versions of the BackupBuddy plugin.