Description
The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the process_status_unlink() function in all versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to delete the back-up progress files and cause a back-up to fail while it is in progress.
Published: 2025-12-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Backup Failure / Availability Impact
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from a missing capability check in the process_status_unlink() method of the Everest Backup plugin, allowing an unauthenticated user to invoke this function and delete the files that track the progress of an ongoing backup. When these files are removed, the backup operation terminates unexpectedly, resulting in a loss of data protection because the backup is never completed and no valid snapshot is produced. This primarily impacts the availability of the backup service for the affected WordPress site.

Affected Systems

All installations of the Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin with versions 2.3.8 and earlier are affected. Site administrators should verify the plugin version and ensure it is not within the vulnerable range.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity that mainly threatens availability. The EPSS score is less than 1%, showing that the likelihood of exploitation is currently very low, and the vulnerability is not listed in the CISA KEV catalog, implying no publicly known exploits. Because the function lacks an authentication requirement, an attacker can trigger the deletion from any remote source, such as the WordPress REST API or plugin settings pages, without needing administrative credentials. This makes the attack vector horizontal and executable by unauthenticated users.

Generated by OpenCVE AI on April 21, 2026 at 01:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Everest Backup plugin to version 2.3.9 or later.
  • If an update is unavailable, temporarily disable or uninstall the plugin until a fixed version is released.
  • Restrict access to the backup configuration interface to users with administrative privileges only.
  • Monitor backup logs for unexpected failures to detect any attempted deletion of progress files.

Generated by OpenCVE AI on April 21, 2026 at 01:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 04 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Everestthemes
Everestthemes everest Backup
Wordpress
Wordpress wordpress
Vendors & Products Everestthemes
Everestthemes everest Backup
Wordpress
Wordpress wordpress

Wed, 03 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 03 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the process_status_unlink() function in all versions up to, and including, 2.3.8. This makes it possible for unauthenticated attackers to delete the back-up progress files and cause a back-up to fail while it is in progress.
Title Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin <= 2.3.8 - Missing Authorization to Unauthenticated Backup Failure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Everestthemes Everest Backup
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:49.946Z

Reserved: 2025-09-11T21:54:46.884Z

Link: CVE-2025-10304

cve-icon Vulnrichment

Updated: 2025-12-03T14:44:04.193Z

cve-icon NVD

Status : Deferred

Published: 2025-12-03T04:15:58.613

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10304

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:15:20Z

Weaknesses