Description
The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized arbitrary file read and deletion in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check combined with a user-controlled backup directory parameter. This makes it possible for unauthenticated attackers to read and delete arbitrary files on the server, leading to Sensitive Information Exposure and potential site takeover. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.
Problem types
Product status
Any version
Timeline
| 2026-05-13: | Disclosed |
Credits
Drew Webber
References
www.wordfence.com/...-e1c5-4e23-9999-16c837353da9?source=cve
plugins.trac.wordpress.org/...up/tags/2.5.2/wp-db-backup.php
plugins.trac.wordpress.org/...-backup/trunk/wp-db-backup.php
plugins.trac.wordpress.org/...-backup/trunk/wp-db-backup.php
plugins.trac.wordpress.org/...-backup/trunk/wp-db-backup.php
plugins.trac.wordpress.org/changeset/3510595/