CVE-2023-5775

The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*

History

05 Feb 2025, 21:31

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/3039678/backwpup - () https://plugins.trac.wordpress.org/changeset/3039678/backwpup - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7e-5903ad50cc13?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4bce4f04-e622-468a-ac7e-5903ad50cc13?source=cve - Third Party Advisory
First Time Inpsyde
Inpsyde backwpup
CWE NVD-CWE-Other
CPE cpe:2.3:a:inpsyde:backwpup:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-02-26 16:27

Updated : 2025-02-05 21:31


NVD link : CVE-2023-5775

Mitre link : CVE-2023-5775

CVE.ORG link : CVE-2023-5775


JSON object : View

Products Affected

inpsyde

  • backwpup