4.7
CVE-2023-7236
- EPSS 0.42%
- Veröffentlicht 18.03.2024 19:15:06
- Zuletzt bearbeitet 05.05.2025 17:58:10
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Backup Bolt <= 1.3.0 - Sensitive Information Exposure
The Backup Bolt WordPress plugin through 1.3.0 is vulnerable to Information Exposure via the unprotected access of debug logs. This makes it possible for unauthenticated attackers to retrieve the debug log which may contain information like system errors which could contain sensitive information.
Mögliche Gegenmaßnahme
Backup Bolt: Update to version 1.4.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Backup Bolt
Version
*-1.3.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Backupbolt ≫ Backup Bolt SwPlatformwordpress Version <= 1.3.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.42% | 0.611 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.7 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.