The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ | Exploit Third Party Advisory |
Configurations
History
16 May 2025, 20:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wpvivid migration\, Backup\, Staging
Wpvivid |
|
CPE | cpe:2.3:a:wpvivid:migration\,_backup\,_staging:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-338 | |
References | () https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ - Exploit, Third Party Advisory |
02 Oct 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
02 Oct 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-02 06:15
Updated : 2025-05-16 20:32
NVD link : CVE-2024-7315
Mitre link : CVE-2024-7315
CVE.ORG link : CVE-2024-7315
JSON object : View
Products Affected
wpvivid
- migration\,_backup\,_staging
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)