CVE-2024-7315

The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:*

History

16 May 2025, 20:32

Type Values Removed Values Added
First Time Wpvivid migration\, Backup\, Staging
Wpvivid
CPE cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:*
CWE CWE-338
References () https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ - () https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ - Exploit, Third Party Advisory

02 Oct 2024, 17:35

Type Values Removed Values Added
Summary
  • (es) El complemento Migration, Backup, Staging de WordPress anterior a 0.9.106 no utiliza suficiente aleatoriedad en el nombre del archivo que se crea al generar una copia de seguridad, lo que podría ser forzado por atacantes para filtrar información confidencial sobre dichas copias de seguridad.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

02 Oct 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-02 06:15

Updated : 2025-05-16 20:32


NVD link : CVE-2024-7315

Mitre link : CVE-2024-7315

CVE.ORG link : CVE-2024-7315


JSON object : View

Products Affected

wpvivid

  • migration\,_backup\,_staging
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)