The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58511 The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-06-17T21:09:12.937Z

Reserved: 2023-11-22T20:45:16.590Z

Link: CVE-2023-6266

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2024-01-11T09:15:48.047

Modified: 2024-11-21T08:43:29.590

Link: CVE-2023-6266

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.