Vulnerabilities > Ithemes > Backupbuddy
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-13 | CVE-2022-31474 | Path Traversal vulnerability in Ithemes Backupbuddy 8.5.8.0/8.7.4.1 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in iThemes BackupBuddy allows Path Traversal.This issue affects BackupBuddy: from 8.5.8.0 through 8.7.4.1. | 7.5 |
2023-02-21 | CVE-2022-4897 | Unspecified vulnerability in Ithemes Backupbuddy 8.5.8.0/8.7.4.1/8.7.5.0 The BackupBuddy WordPress plugin before 8.8.3 does not sanitise and escape some parameters before outputting them back in various places, leading to Reflected Cross-Site Scripting | 6.1 |
2013-04-02 | CVE-2013-2744 | Information Exposure vulnerability in Ithemes Backupbuddy 2.2.25 importbuddy.php in the BackupBuddy plugin 2.2.25 for WordPress allows remote attackers to obtain configuration information via a step 0 phpinfo action, which calls the phpinfo function. | 5.0 |
2013-04-02 | CVE-2013-2743 | Improper Authentication vulnerability in Ithemes Backupbuddy importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress allows remote attackers to bypass authentication via a crafted integer in the step parameter. | 7.5 |
2013-04-02 | CVE-2013-2742 | Information Disclosure vulnerability in BackupBuddy 'importbuddy.php' importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not reliably delete itself after completing a restore operation, which makes it easier for remote attackers to obtain access via subsequent requests to this script. | 7.5 |
2013-04-02 | CVE-2013-2741 | Improper Authentication vulnerability in Ithemes Backupbuddy importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not require that authentication be enabled, which allows remote attackers to obtain sensitive information, or overwrite or delete files, via vectors involving a (1) direct request, (2) step=1 request, (3) step=2 or step=3 request, or (4) step=7 request. | 7.5 |