• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical flaw uncovered in wordpress backup plugin used by over

Critical Flaw Uncovered in WordPress Backup Plugin Used by Over 3 Million Sites

You are here: Home / General Cyber Security News / Critical Flaw Uncovered in WordPress Backup Plugin Used by Over 3 Million Sites
February 19, 2022

Patches have been issued to include a “significant” security vulnerability in UpdraftPlus, a WordPress plugin with more than three million installations, that can be weaponized to download the site’s private facts using an account on the susceptible web sites.

“All variations of UpdraftPlus from March 2019 onwards have contained a vulnerability induced by a missing permissions-stage check, making it possible for untrusted people access to backups,” the maintainers of the plugin stated in an advisory printed this week.

Automatic GitHub Backups

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Security researcher Marc-Alexandre Montpas of Automattic has been credited with exploring and reporting the vulnerability on February 14 that’s been assigned the identifier CVE-2022-0633 (CVSS score: 8.5). The issue impacts UpdraftPlus versions from 1.16.7 to 1.22.2.

UpdraftPlus is a backup and restoration solution that is capable of executing entire, guide, or scheduled backups of WordPress information, databases, plugins and themes, which can then be reinstated by way of the WordPress admin dashboard.

A consequence of this defect is that it lets any logged-in consumer on a WordPress set up with UpdraftPlus put in to physical exercise the privilege of downloading an present backup – permissions which really should have been reserved for administrative buyers only.

Prevent Data Breaches

Over and above leaking passwords and other confidential data, it could also “in some instances web page takeover if the attacker is capable to acquire database credentials from a configuration file and effectively obtain the website databases,” WordPress security corporation Wordfence explained.

Users of the UpdraftPlus plugin are recommended to update to variation 1.22.3 (or 2.22.3 for the Top quality variation) to mitigate any opportunity exploitation. The most recent version out there as of February 17 is 1.22.4, which addresses bugs connected to printing automobile-backup possibilities on PHP 8.

Identified this short article interesting? Abide by THN on Facebook, Twitter  and LinkedIn to study a lot more unique material we article.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Probation for Medicare Fraudster
Next Post: U.S. Cybersecurity Agency Publishes List of Free Security Tools and Services u.s. cybersecurity agency publishes list of free security tools and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.