The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_download_backup function. This makes it possible for attackers to have an account with only activate_plugins capability to access arbitrary files on the server, which can contain sensitive information. This only impacts sites hosted on Windows servers.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-27249 The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_download_backup function. This makes it possible for attackers to have an account with only activate_plugins capability to access arbitrary files on the server, which can contain sensitive information. This only impacts sites hosted on Windows servers.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T19:11:52.407Z

Reserved: 2024-03-07T17:29:38.209Z

Link: CVE-2024-2294

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:52.407Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-16T02:15:09.200

Modified: 2024-11-21T09:09:26.897

Link: CVE-2024-2294

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T11:14:54Z