Monday, May 11, 2026
HomeSEOWordPress Backup Plugin Vulnerability Impacted 3+ Million Installations

WordPress Backup Plugin Vulnerability Impacted 3+ Million Installations

[ad_1]

Safety researcher at Automattic found a vulnerability affecting well-liked WordPress backup plugin, UpdraftPlus. The vulnerability allowed hackers to obtain person names and hashed passwords. Automattic calls it a “extreme vulnerability.”

UpdraftPlus WordPress Backup Plugin

UpdraftPlus is a well-liked WordPress backup plugin that’s actively put in in over 3 million web sites.

The plugin permits WordPress directors to backup their WordPress installations, together with all the database which comprises person credentials,  passwords and different delicate info.

Publishers depend on UpdraftPlus to stick to the very best requirements of safety of their plugin due to how delicate the info is that’s backed up with the plugin.

UpdraftPlus Vulnerability

The vulnerability was found by an audit carried out by a safety researcher at Automattic’s Jetpack.

They found two beforehand unknown vulnerabilities.

The primary was associated to how UpdraftPlus safety tokens referred to as, nonces, could possibly be leaked. This allowed an attacker to acquire the backup, together with the nonce.

In line with WordPress, nonces are usually not presupposed to be the primary line of protection towards hackers. It explicitly states that capabilities must be protected by correctly validating who has the right credentials (through the use of the perform referred to as current_user_can()).

WordPress explains:

“Nonces ought to by no means be relied on for authentication, authorization, or entry management. Defend your capabilities utilizing current_user_can(), and at all times assume nonces could be compromised.”

The second vulnerability was tied to an improper validation of a registered customers position, exactly what WordPress warns that builders ought to take steps to lock down plugins.

The improper person position validation allowed somebody with the info from the earlier vulnerability to obtain any of the backups, which in fact comprises delicate info.

Jetpack describes it:

“Sadly, the UpdraftPlus_Admin::maybe_download_backup_from_email technique, which is hooked to admin_init didn’t straight validate customers’ roles both.

Whereas it did apply some checks not directly, resembling checking the $pagenow world variable, previous analysis has proven that this variable can include arbitrary person enter.

Dangerous actors may use this endpoint to obtain file & database backups based mostly on the data they leaked from the aforementioned heartbeat bug.”

The US Authorities Nationwide Vulnerability database warns that UpdraftPlus didn’t “…correctly validate a person has the required privileges to entry a backup’s nonce identifier, which can enable any customers with an account on the positioning (resembling subscriber) to obtain the newest website & database backup.”

WordPress Pressured Updates of UpdraftPlus

The vulnerability was so extreme, WordPress took the extraordinary step of forcing computerized updates on all installations that hadn’t but up to date UpdraftPlus to the newest model.

However publishers are really helpful to take it with no consideration that their set up was up to date.

Affected Variations of UpdraftPlus

UpdraftPlus free variations earlier than 1.22.3 and UpdraftPlus premium variations earlier than 2.22.3 are weak to the assault.

It’s really helpful that publishers examine to see that they’re utilizing the very newest model of UpdraftPlus.

Citations

Learn the Jetpack Announcement

Extreme Vulnerability Mounted In UpdraftPlus 1.22.3

Learn the UpdraftPlus Announcement

UpdraftPlus safety launch – 1.22.3 / 2.22.3 – please improve

Learn the U.S. Authorities Documentation on the Vulnerability

CVE-2022-0633 Element



[ad_2]

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments