CWE
352
EPSS
0.052%
Advisory Published
Updated

CVE-2023-5982: CSRF

First published: Tue Nov 07 2023(Updated: )

The UpdraftPlus: WordPress Backup & Migration Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23.10. This is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action used to update Google Drive remote storage location. This makes it possible for unauthenticated attackers to modify the Google Drive location that backups are sent to via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can make it possible for attackers to receive backups for a site which may contain sensitive information.

Credit: security@wordfence.com

Affected SoftwareAffected VersionHow to fix
Updraftplus Updraftplus<=1.23.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability?

    The vulnerability ID for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability is CVE-2023-5982.

  • What is the severity rating for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability?

    The severity rating for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability is medium with a CVSS score of 5.4.

  • What is the affected software for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability?

    The affected software for the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability is UpdraftPlus: WordPress Backup & Migration Plugin versions up to, and including, 1.23.10.

  • What is the cause of the vulnerability in UpdraftPlus: WordPress Backup & Migration Plugin?

    The vulnerability in UpdraftPlus: WordPress Backup & Migration Plugin is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action.

  • Are there any references for further information about the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability?

    Yes, you can find more information about the UpdraftPlus: WordPress Backup & Migration Plugin vulnerability at the following references: [Reference 1](https://www.wordfence.com/threat-intel/vulnerabilities/id/e1be11c5-0a44-4816-b6bf-d330cb51dbf3?source=cve), [Reference 2](https://plugins.trac.wordpress.org/changeset/2989669/updraftplus/tags/1.23.11/class-updraftplus.php).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203