Beta

Report

XCloner Backup, Restore and Migrate 4.2.1-4.2.12 is vulnerable to Unprotected AJAX Action to Arbitrary File Overwrite and Sensitive Information Disclosure vulnerability

Published
2020-09-21

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.

CVSS

Score:9.9

Severity:Critical

Version:4.2.1-4.2.12

There is a patch available in v4.2.13 and we strongly recommend you update to this version as soon as possible.