HTTP: WordPress Backuply Plugin options SQL Injection

This signature detects attempts to exploit a known vulnerability against WordPress. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

The Backuply Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter passed to the backuply_wp_clone_sql() function in all versions up to, and including, 1.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Affected Products

Softaculous backuply

Short Name
HTTP:SQL:WP-BCKUP-PLUGIN
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Backuply CVE-2024-8669 Injection Plugin SQL WordPress options
Release Date
11/14/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3759
False Positive
Unknown
Vendors

Softaculous

Found a potential security threat?