The BackWPup plugin for WordPress is vulnerable to Plaintext Storage of Backup Destination Password in all versions up to, and including, 4.0.2. This is due to to the plugin improperly storing backup destination passwords in plaintext. This makes it possible for authenticated attackers, with administrator-level access, to retrieve the password from the password input field in the UI or from the options table where the password is stored.
Published 2024-02-26 16:27:49
Updated 2025-02-05 21:31:24
Source Wordfence
View at NVD,   CVE.org

Products affected by CVE-2023-5775

Exploit prediction scoring system (EPSS) score for CVE-2023-5775

0.24%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-5775

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
2.7
LOW CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1.2
1.4
NIST 2025-02-05
2.2
LOW CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
0.7
1.4
Wordfence 2024-02-26

References for CVE-2023-5775

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!