cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwp-db-backup wp-db-backup

Direction: ascending
Jun 07, 2024

Database Backup for WordPress # CVE-2022-1577

CVE, Research URL

CVE-2022-1577

Date
Jun 08, 2022
Research Description
The Database Backup for WordPress plugin before 2.5.2 does not have CSRF check in place when updating the schedule backup settings, which could allow an attacker to make a logged in admin change them via a CSRF attack. This could lead to cases where attackers can send backup notification emails to themselves, which contain more details. Or disable the automatic backup schedule
Affected versions
max 2.5.2.
Status
vulnerable

Database Backup for WordPress # CVE-2022-0255

CVE, Research URL

CVE-2022-0255

Date
Feb 21, 2022
Research Description
The Database Backup for WordPress plugin before 2.5.1 does not properly sanitise and escape the fragment parameter before using it in a SQL statement in the admin dashboard, leading to a SQL injection issue
Affected versions
max 2.5.1.
Status
vulnerable

Database Backup for WordPress # CVE-2021-24322

CVE, Research URL

CVE-2021-24322

Date
Jun 01, 2021
Research Description
The Database Backup for WordPress plugin before 2.4 did not escape the backup_recipient POST parameter in before output it back in the attribute of an HTML tag, leading to a Stored Cross-Site Scripting issue.
Affected versions
max 2.4.
Status
vulnerable

Database Backup for WordPress # CVE-2014-10076

CVE, Research URL

CVE-2014-10076

Date
Oct 05, 2018
Research Description
The wp-db-backup plugin 2.2.4 for WordPress relies on a five-character string for access control, which makes it easier for remote attackers to read backup archives via a brute-force attack.
Affected versions
max 2.3.0.
Status
vulnerable

Database Backup for WordPress # CVE-2006-4208

CVE, Research URL

CVE-2006-4208

Date
Aug 18, 2006
Research Description
Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.
Affected versions
max 2.4.
Status
vulnerable
May 15, 2026

Database Backup for WordPress # CVE-2026-4030

CVE, Research URL

CVE-2026-4030

Date
May 14, 2026
Research Description
The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized arbitrary file read and deletion in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check combined with a user-controlled backup directory parameter. This makes it possible for unauthenticated attackers to read and delete arbitrary files on the server, leading to Sensitive Information Exposure and potential site takeover. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.
Affected versions
max 2.5.3.
Status
vulnerable

Database Backup for WordPress # CVE-2026-4031

CVE, Research URL

CVE-2026-4031

Date
May 14, 2026
Research Description
The Database Backup for WordPress plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.5.2. This is due to the plugin not restricting access to the wp_db_temp_dir parameter, which controls where database backups are written. This makes it possible for unauthenticated attackers to send a request to wp-cron.php with a poisoned wp_db_temp_dir value pointing to a publicly accessible directory (e.g., wp-content/uploads/), and if a scheduled backup is due, intercept the backup file before it is cleaned up. The backup file has a predictable name based on the database name, table prefix, date, and Swatch Internet Time, making interception reliable. Successful exploitation leads to Sensitive Information Exposure including database credentials, user password hashes, and personally identifiable information. This vulnerability requires that the site administrator has configured scheduled backups.
Affected versions
max 2.5.3.
Status
vulnerable

Database Backup for WordPress # CVE-2026-4029

CVE, Research URL

CVE-2026-4029

Date
May 14, 2026
Research Description
The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized database export in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check. This makes it possible for unauthenticated attackers to export database tables, leading to Sensitive Information Exposure. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.
Affected versions
max 2.5.3.
Status
vulnerable