Impact
The Database Toolset WordPress plugin stores database backup files in a publicly accessible location, allowing an unauthenticated attacker to read these files. The vulnerability is a classic case of sensitive information exposure (CWE-200), where backup files may contain the entire database contents, including configuration data, user credentials, and other confidential information. The impact is a loss of confidentiality, potentially leading to data leaks or further compromise if the attacker uses the backup for subsequent attacks.
Affected Systems
Vendors and products affected are neoslab's Database Toolset plugin for WordPress. The vulnerability exists in all releases up to and including version 1.8.4. Users running those versions should verify the installed version and upgrade if possible.
Risk and Exploitability
The CVSS score of 5.9 indicates a moderate severity. The EPSS score is less than 1%, suggesting a low probability of exploitation at the time of analysis, and the vulnerability is not listed in CISA’s KEV catalog. Attackers must acquire the accurate file name to download a backup; an index file is present, but enumeration would require success in a brute‑force search. The attack vector is remote, unauthenticated, and relies on file disclosure. While the exploitation is technically straightforward once the file is located, the low availability of the file path keeps overall risk moderate.
OpenCVE Enrichment
EUVD