First published: Fri Sep 16 2022(Updated: )
The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPvivid Migration, Backup, Staging | <0.9.76 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2863 is a vulnerability in the Migration, Backup, Staging WordPress plugin before 0.9.76 that allows high privilege users to read any file from the web server via a Traversal attack.
The Migration, Backup, Staging WordPress plugin before version 0.9.76 is affected by CVE-2022-2863.
CVE-2022-2863 has a severity value of 4.9, classified as medium.
High privilege users can exploit CVE-2022-2863 by using a Traversal attack to read any file from the web server.
Yes, you can refer to the following sources for more information on CVE-2022-2863: [Packet Storm Security](http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html), [Full Disclosure](http://seclists.org/fulldisclosure/2022/Oct/0), [WPScan](https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5).