Vulnerabilities and security researches forall-in-one-wp-migration all-in-one-wp-migration
Direction: ascendingJun 07, 2024
All-in-One WP Migration # CVE-2021-24216
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 07, 2022
- Research Description
- The All-in-One WP Migration WordPress plugin before 7.41 does not validate uploaded files' extension, which allows administrators to upload PHP files on their site, even on multisite installations.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
All-in-One WP Migration # CVE-2022-1476
- CVE, Research URL
- Home page URL
- Application
- Date
- May 11, 2022
- Research Description
- The All-in-One WP Migration plugin for WordPress is vulnerable to arbitrary file deletion via directory traversal due to insufficient file validation via the ~/lib/model/class-ai1wm-backups.php file, in versions up to, and including, 7.58. This can be exploited by administrative users, and users who have access to the site's secret key.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
All-in-One WP Migration # CVE-2022-2546
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 02, 2023
- Research Description
- The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Oct 23, 2024
All-in-One WP Migration # CVE-2024-8852
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 22, 2024
- Research Description
- The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.86 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information such as full paths contained in the exposed log files.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Oct 28, 2024
All-in-One WP Migration # CVE-2024-9162
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 28, 2024
- Research Description
- The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to arbitrary PHP Code Injection due to missing file type validation during the export in all versions up to, and including, 7.86. This makes it possible for authenticated attackers, with Administrator-level access and above, to create an export file with the .php extension on the affected site's server, adding an arbitrary PHP code to it, which may make remote code execution possible.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Mar 13, 2025
All-in-One WP Migration # CVE-2024-10942
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 13, 2025
- Research Description
- The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.89 via deserialization of untrusted input in the 'replace_serialized_values' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must export and restore a backup in order to trigger the exploit.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable