Impact
The vulnerability is a classic local file inclusion flaw in the Supsystic Backup WordPress plugin version 2.3.9. An unauthenticated attacker can manipulate the download path parameter in admin.php requests to include directory traversal sequences. This allows the attacker to read any file on the server, such as /etc/passwd, and to delete files using the removeAction parameter. Consequently, confidentiality and integrity of sensitive data can be compromised, and critical files can be deleted, disrupting service availability.
Affected Systems
Supsystic Backup plugin for WordPress, version 2.3.9. Any WordPress site that has installed this plugin in the vulnerable version is potentially exposed. No other vendors or versions are listed as affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. EPSS is not available, so the exploitation probability is unclear, but the vulnerability is unauthenticated and requires only simple HTTP requests, making it highly feasible. The plugin has not been flagged in the CISA KEV catalog. Attackers can exploit it by sending crafted admin.php requests from any external IP, abusing the download path or removeAction parameters.
OpenCVE Enrichment