CVE-2025-2257

The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.10 via the compression_level setting. This is due to the plugin using the compression_level setting in proc_open() without any validation. This makes it possible for authenticated attackers, with administrator-level access and above, to execute code on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:boldgrid:total_upkeep:*:*:*:*:*:wordpress:*:*

History

22 May 2025, 14:43

Type Values Removed Values Added
First Time Boldgrid
Boldgrid total Upkeep
References () https://github.com/BoldGrid/boldgrid-backup/pull/622/files - () https://github.com/BoldGrid/boldgrid-backup/pull/622/files - Patch
References () https://plugins.svn.wordpress.org/boldgrid-backup/tags/1.16.7/admin/compressor/class-boldgrid-backup-admin-compressor-system-zip.php - () https://plugins.svn.wordpress.org/boldgrid-backup/tags/1.16.7/admin/compressor/class-boldgrid-backup-admin-compressor-system-zip.php - Release Notes
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257988%40boldgrid-backup&new=3257988%40boldgrid-backup&sfp_email=&sfph_mail=#file9 - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257988%40boldgrid-backup&new=3257988%40boldgrid-backup&sfp_email=&sfph_mail=#file9 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec3cc3e-c11b-43b6-9dd0-caa5ccfb90c8?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec3cc3e-c11b-43b6-9dd0-caa5ccfb90c8?source=cve - Third Party Advisory
CPE cpe:2.3:a:boldgrid:total_upkeep:*:*:*:*:*:wordpress:*:*

27 Mar 2025, 16:45

Type Values Removed Values Added
Summary
  • (es) El complemento Total Upkeep – WordPress Backup Plugin plus Restore & Migrate de BoldGrid para WordPress es vulnerable a la ejecución remota de código en todas las versiones hasta la 1.16.10 incluida, a través de la configuración compression_level. Esto se debe a que el complemento utiliza la configuración compression_level en proc_open() sin ninguna validación. Esto permite que atacantes autenticados, con acceso de administrador o superior, ejecuten código en el servidor.

26 Mar 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-26 09:15

Updated : 2025-05-22 14:43


NVD link : CVE-2025-2257

Mitre link : CVE-2025-2257

CVE.ORG link : CVE-2025-2257


JSON object : View

Products Affected

boldgrid

  • total_upkeep
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')