The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up.
History

Mon, 13 Jan 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-03-07T14:47:47.177Z

Updated: 2025-01-13T17:01:08.575Z

Reserved: 2023-03-07T14:47:40.224Z

Link: CVE-2022-4932

cve-icon Vulnrichment

Updated: 2024-08-03T01:55:46.036Z

cve-icon NVD

Status : Modified

Published: 2023-03-07T15:15:10.980

Modified: 2024-11-21T07:36:16.787

Link: CVE-2022-4932

cve-icon Redhat

No data.