First published: Mon Aug 22 2022(Updated: )
The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Snapcreek Duplicator | <1.4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2551 is a vulnerability in the Duplicator WordPress plugin before version 1.4.7 that allows unauthenticated visitors to access the URL of a backup and download the full site backup without authentication.
CVE-2022-2551 has a severity rating of high with a CVSS score of 7.5.
The Duplicator WordPress plugin before version 1.4.7 is affected by CVE-2022-2551.
To fix CVE-2022-2551, upgrade to version 1.4.7 or later of the Duplicator WordPress plugin.
You can find more information about CVE-2022-2551 at the following references: [GitHub](https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551) and [WPScan](https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0).