CVSS 3.1 Score 6.5 of 10 (medium)


Published Jan 27, 2024
Updated: Feb 1, 2024


CVE-2024-0697 is a vulnerability affecting the Backuply – Backup, Restore, Migrate and Clone plugin for WordPress in versions up to and including 1.2.3. This vulnerability allows attackers with administrator privileges or higher to perform Directory Traversal by exploiting the node_id parameter in the backuply_get_jstree function. As a result, the attackers can read arbitrary files on the server, potentially exposing sensitive information. The vulnerability has a risk score of 25 and a base severity of MEDIUM according to the CVSS:3.1 rating. No remediation steps are mentioned in the provided information, but it is recommended for affected organizations to update their plugin to a patched version once available to mitigate this vulnerability's potential danger.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-0697 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions