CVSS 3.1 Score 6.5 of 10 (medium)


Published Jan 27, 2024
Updated: Feb 1, 2024


CVE-2024-0697 is a vulnerability affecting the Backuply – Backup, Restore, Migrate and Clone plugin for WordPress in versions up to and including 1.2.3. This vulnerability allows attackers with administrator privileges or higher to perform Directory Traversal by exploiting the node_id parameter in the backuply_get_jstree function. As a result, the attackers can read arbitrary files on the server, potentially exposing sensitive information. The vulnerability has a risk score of 25 and a base severity of MEDIUM according to the CVSS:3.1 rating. No remediation steps are mentioned in the provided information, but it is recommended for affected organizations to update their plugin to a patched version once available to mitigate this vulnerability's potential danger.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-0697 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options