7.5
CVSSv3

CVE-2020-7241

Published: 20/01/2020 Updated: 18/04/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The WP Database Backup plugin up to and including 5.5 for WordPress stores downloads by default locally in the directory wp-content/uploads/db-backup/. This might allow malicious users to read ZIP archives by guessing random ID numbers, guessing date strings with a 2020_{0..1}{0..2}_{0..3}{0..9} format, guessing UNIX timestamps, and making HTTPS requests with the complete guessed URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wpseeds wp database backup

Github Repositories

This repo will be describe how to exploit WP Database Backup WordPress Plugin <=5.5

Exploiting WP Database Backup WordPress Plugin This repo will be describe how to exploit WP Database Backup WordPress Plugin versions &lt;=55 I published this CVE-2020-7241 About WP Database Backup WordPress Plugin WP Database Backup plugin helps you to create Database Backup and Restore Database Backup easily on single click Manual or Automated Database Backups And al