Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No reference.
Wed, 16 Jul 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 CWE-306 |
|
References |
|
|
Metrics |
cvssV4_0
|
Wed, 16 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | WordPress Total Upkeep (BoldGrid Backup) Plugin < 1.14.10 Unauthenticated Backup Disclosure | |
Metrics |
ssvc
|
Wed, 16 Jul 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated information disclosure vulnerability exists in the WordPress Total Upkeep plugin (also known as BoldGrid Backup) prior to version 1.14.10. The plugin exposes multiple endpoints that allow unauthenticated users to retrieve detailed server configuration (env-info.php) and discover backup metadata (restore-info.json). These backups, which may include full SQL database dumps, are accessible without authentication if their paths are known or guessed. The restore-info.json endpoint discloses the absolute filesystem path of the latest backup, which attackers can convert into a web-accessible URL under wp-content/uploads/ and download. Extracting the database archive may yield credential hashes from the wp_users table, facilitating offline password cracking or credential stuffing attacks. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority as it is a duplicate of CVE-2020-36848. |
Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 09 Jul 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated information disclosure vulnerability exists in the WordPress Total Upkeep plugin (also known as BoldGrid Backup) prior to version 1.14.10. The plugin exposes multiple endpoints that allow unauthenticated users to retrieve detailed server configuration (env-info.php) and discover backup metadata (restore-info.json). These backups, which may include full SQL database dumps, are accessible without authentication if their paths are known or guessed. The restore-info.json endpoint discloses the absolute filesystem path of the latest backup, which attackers can convert into a web-accessible URL under wp-content/uploads/ and download. Extracting the database archive may yield credential hashes from the wp_users table, facilitating offline password cracking or credential stuffing attacks. | |
Title | WordPress Total Upkeep (BoldGrid Backup) Plugin < 1.14.10 Unauthenticated Backup Disclosure | |
Weaknesses | CWE-200 CWE-306 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: REJECTED
Assigner: VulnCheck
Published:
Updated: 2025-07-16T15:49:08.043Z
Reserved: 2025-04-15T19:15:22.551Z
Link: CVE-2025-34084

Updated:

Status : Rejected
Published: 2025-07-09T01:15:50.087
Modified: 2025-07-16T16:15:26.057
Link: CVE-2025-34084

No data.

No data.