We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An unauthenticated information disclosure vulnerability exists in the WordPress Total Upkeep plugin (also known as BoldGrid Backup) prior to version 1.14.10. The plugin exposes multiple endpoints that allow unauthenticated users to retrieve detailed server configuration (env-info.php) and discover backup metadata (restore-info.json). These backups, which may include full SQL database dumps, are accessible without authentication if their paths are known or guessed. The restore-info.json endpoint discloses the absolute filesystem path of the latest backup, which attackers can convert into a web-accessible URL under wp-content/uploads/ and download. Extracting the database archive may yield credential hashes from the wp_users table, facilitating offline password cracking or credential stuffing attacks.
Reserved 2025-04-15 | Published 2025-07-09 | Updated 2025-07-09 | Assigner VulnCheckCWE-200 Exposure of Sensitive Information to an Unauthorized Actor
CWE-306 Missing Authentication for Critical Function
Wadeek
raw.githubusercontent.com/...p/wp_total_upkeep_downloader.rb
www.exploit-db.com/exploits/49252
plugins.trac.wordpress.org/changeset/2439376/boldgrid-backup
www.boldgrid.com/wordpress-backup-plugin/
wordpress.org/plugins/boldgrid-backup/
vulncheck.com/...keep-boldgrid-backup-plugin-info-disclosure
Support options