CVE-2024-7315

The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:*

History

16 May 2025, 20:32

Type Values Removed Values Added
CWE CWE-338
CPE cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ - () https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ - Exploit, Third Party Advisory
First Time Wpvivid migration\, Backup\, Staging
Wpvivid

Information

Published : 2024-10-02 06:15

Updated : 2025-05-16 20:32


NVD link : CVE-2024-7315

Mitre link : CVE-2024-7315

CVE.ORG link : CVE-2024-7315


JSON object : View

Products Affected

wpvivid

  • migration\,_backup\,_staging
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)