Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Backwpup
Backwpup backwpup Wordpress Wordpress wordpress |
|
| Vendors & Products |
Backwpup
Backwpup backwpup Wordpress Wordpress wordpress |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Oct 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'backwpup_working' AJAX action in all versions up to, and including, 5.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve access to a back-up's filename while a backup is running. This information has little value on it's own, but could be used to aid in a brute force attack to retrieve back-up contents in limited environments (i.e. NGINX). | |
| Title | BackWPup <= 5.5.0 - Missing Authorization to Sensitive Information Exposure | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-27T15:57:24.084Z
Reserved: 2025-09-16T19:37:30.649Z
Link: CVE-2025-10579
Updated: 2025-10-27T15:27:09.623Z
Status : Awaiting Analysis
Published: 2025-10-25T05:15:36.007
Modified: 2025-10-27T13:20:15.637
Link: CVE-2025-10579
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:10:24Z