Home

Description

WordPress Plugin Backup and Restore 1.0.3 contains an arbitrary file deletion vulnerability that allows authenticated attackers to delete files by manipulating parameters in AJAX requests. Attackers can send POST requests to admin-ajax.php with crafted file_name and folder_name parameters to delete arbitrary files from the WordPress installation directory.

PUBLISHED Reserved 2026-05-16 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

1.0.3
affected

Credits

Murat DEMIRCI (@butterflyhunt3r) finder

References

www.exploit-db.com/exploits/50503 (ExploitDB-50503) exploit

www.miniorange.com/ (Official Product Homepage) product

wordpress.org/plugins/backup-and-restore-for-wp/ (Product Reference) product

www.vulncheck.com/...kup-and-restore-arbitrary-file-deletion (VulnCheck Advisory: WordPress Plugin Backup and Restore 1.0.3 Arbitrary File Deletion) third-party-advisory

cve.org (CVE-2021-47979)

nvd.nist.gov (CVE-2021-47979)

Download JSON