First published: Sat Mar 01 2025(Updated: )
The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'database_backup_ajax_delete' function in all versions up to, and including, 2.35. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 2.36.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Database Backup | <=2.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13910 has a high severity rating due to its potential for arbitrary file deletion.
To fix CVE-2024-13910, upgrade the Database Backup and check Tables Automated With Scheduler 2024 plugin to version 2.36 or later.
CVE-2024-13910 affects all versions of the Database Backup and check Tables Automated With Scheduler 2024 plugin up to and including version 2.35.
CVE-2024-13910 is an arbitrary file deletion vulnerability caused by insufficient file path validation.
Anyone using the Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress up to version 2.35 is impacted by CVE-2024-13910.