vulnerability

WordPress Plugin: backuply: CVE-2024-0697: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Severity
8
CVSS
(AV:N/AC:L/Au:M/C:C/I:C/A:N)
Published
Jan 26, 2024
Added
May 15, 2025
Modified
Jun 24, 2025

Description

The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.

Solution

backuply-plugin-cve-2024-0697
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.