First published: Wed Jan 15 2025(Updated: )
The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the showdata and initiate_restore parameters in all versions up to, and including, 1.24.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an admin user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.24.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0215 is rated as a medium severity vulnerability due to its impact on application security through reflected cross-site scripting.
To fix CVE-2025-0215, update the UpdraftPlus: WP Backup & Migration Plugin to version 1.24.13 or later, which contains the necessary security patches.
The vulnerable parameters in CVE-2025-0215 are 'showdata' and 'initiate_restore', which lack sufficient input sanitization and output escaping.
CVE-2025-0215 affects all versions of the UpdraftPlus: WP Backup & Migration Plugin up to and including version 1.24.12.
CVE-2025-0215 allows for reflected cross-site scripting attacks, potentially enabling attackers to execute malicious scripts in the context of a user’s browser.