<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Database Backup for WordPress Plugin &lt;= 2.5.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/database-backup-for-wordpress-plugin--2.5.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 13:19:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/database-backup-for-wordpress-plugin--2.5.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4031 - Database Backup for WordPress Plugin Authorization Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-auth-bypass/</link><pubDate>Thu, 14 May 2026 13:19:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-auth-bypass/</guid><description>CVE-2026-4031 is an authorization bypass vulnerability in the Database Backup for WordPress plugin (&lt;= 2.5.2) that allows unauthenticated attackers to intercept database backup files by manipulating the backup directory via the wp_db_temp_dir parameter, leading to sensitive information exposure.</description><content:encoded><![CDATA[<p>The Database Backup for WordPress plugin, versions 2.5.2 and earlier, contains an authorization bypass vulnerability (CVE-2026-4031). This flaw stems from the plugin&rsquo;s failure to restrict access to the <code>wp_db_temp_dir</code> parameter. Unauthenticated attackers can exploit this vulnerability by sending a crafted request to <code>wp-cron.php</code>, poisoning the <code>wp_db_temp_dir</code> value to point to a publicly accessible directory, such as <code>wp-content/uploads/</code>. If a scheduled database backup is due, the attacker can intercept the backup file before it is cleaned up. The predictable naming convention of the backup file (based on database name, table prefix, date, and Swatch Internet Time) makes successful interception highly probable. This exploitation results in the exposure of sensitive information, including database credentials, user password hashes, and personally identifiable information (PII). This vulnerability requires that the site administrator has configured scheduled backups for exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Database Backup for WordPress plugin with scheduled backups enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>wp-cron.php</code>.</li>
<li>The request includes a poisoned <code>wp_db_temp_dir</code> parameter, setting it to a publicly accessible directory such as <code>wp-content/uploads/</code>.</li>
<li>The attacker sends the crafted HTTP request to the WordPress site&rsquo;s <code>wp-cron.php</code>.</li>
<li>If a scheduled database backup is triggered by the wp-cron.php execution, the plugin writes the backup file to the attacker-controlled directory.</li>
<li>The attacker leverages the predictable naming scheme (database name, table prefix, date, and Swatch Internet Time) to determine the exact filename of the backup.</li>
<li>The attacker retrieves the backup file from the publicly accessible directory via HTTP(S).</li>
<li>The attacker extracts sensitive information, including database credentials, user password hashes, and personally identifiable information, from the intercepted backup file.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4031 allows unauthenticated attackers to access sensitive information stored within the WordPress database backups. This includes database credentials, user password hashes, and personally identifiable information. The number of victims depends on the prevalence of the vulnerable plugin and the number of sites with scheduled backups enabled. This can lead to complete compromise of the WordPress site and potentially other systems if the database credentials are reused.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Database Backup for WordPress plugin to the latest version (greater than 2.5.2) to patch CVE-2026-4031.</li>
<li>Monitor web server logs for POST requests to <code>wp-cron.php</code> with suspicious <code>wp_db_temp_dir</code> parameters (see Sigma rule <code>Detect Suspicious wp_db_temp_dir Parameter in wp-cron.php</code>).</li>
<li>Implement strict file access controls on the <code>wp-content/uploads/</code> directory to prevent unauthorized access to any files written there.</li>
<li>Review and restrict access to <code>wp-cron.php</code> to prevent unauthorized triggering of scheduled tasks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authorization-bypass</category><category>sensitive-data-exposure</category><category>cve</category></item><item><title>Database Backup for WordPress Plugin Arbitrary File Read and Deletion Vulnerability (CVE-2026-4030)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-file-read-deletion/</link><pubDate>Thu, 14 May 2026 13:19:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-file-read-deletion/</guid><description>The Database Backup for WordPress plugin before 2.5.3 is vulnerable to unauthenticated arbitrary file read and deletion due to improper authorization checks and user-controlled backup directories, leading to sensitive information exposure and potential site takeover on WordPress Multisite environments.</description><content:encoded><![CDATA[<p>The Database Backup for WordPress plugin, versions 2.5.2 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-4030). This flaw stems from the plugin&rsquo;s failure to properly enforce the return value of its authorization checks. Coupled with a user-controlled backup directory parameter, this weakness allows unauthenticated attackers to read and delete arbitrary files on the affected WordPress server. This vulnerability is only exploitable in WordPress Multisite environments where the deprecated <code>is_site_admin()</code> function exists. Successful exploitation can lead to sensitive information exposure and potential site takeover, impacting the confidentiality and integrity of the targeted WordPress installation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress Multisite installation using the vulnerable Database Backup for WordPress plugin (&lt;= 2.5.2).</li>
<li>The attacker crafts a malicious HTTP request targeting the plugin&rsquo;s functionality related to backup directory handling.</li>
<li>The crafted request leverages the user-controlled backup directory parameter to specify a target file path outside the intended backup directory.</li>
<li>The plugin fails to properly validate or sanitize the provided file path due to the insufficient authorization check.</li>
<li>The plugin attempts to access the specified file based on the attacker-controlled path.</li>
<li>If the request is for file reading, the plugin exposes the contents of the targeted file to the attacker in the HTTP response. If the request is for file deletion, the targeted file is removed from the server.</li>
<li>The attacker gains unauthorized access to sensitive information, such as configuration files, database credentials, or other user data.</li>
<li>The attacker uses the exposed information to further compromise the WordPress installation, potentially leading to a full site takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4030 allows unauthenticated attackers to read arbitrary files on the server. This can lead to the exposure of sensitive information, including configuration files, database credentials, and user data. Attackers can also delete arbitrary files, potentially disrupting website functionality and leading to data loss. In WordPress Multisite environments, this can lead to a full site takeover, affecting all sites within the network. The overall impact is a compromise of confidentiality, integrity, and availability of the affected WordPress installation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Database Backup for WordPress plugin to version 2.5.3 or later to patch CVE-2026-4030.</li>
<li>Monitor web server logs for suspicious requests containing file paths outside the intended backup directory to detect potential exploitation attempts. Deploy the Sigma rules provided in this brief to your SIEM.</li>
<li>Implement strong file permission controls on the WordPress server to limit access to sensitive files.</li>
<li>Consider disabling the Database Backup for WordPress plugin in WordPress Multisite environments if the <code>is_site_admin()</code> function is deprecated.</li>
<li>Review WordPress Multisite configurations and ensure proper access controls are in place to prevent unauthorized file access.</li>
<li>Enable webserver logging to capture cs-uri-stem and cs-uri-query for request analysis (see Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file_read</category><category>file_deletion</category><category>cve</category></item><item><title>CVE-2026-4029: Database Backup for WordPress Plugin Unauthorized Database Export</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-export/</link><pubDate>Thu, 14 May 2026 13:19:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-db-backup-export/</guid><description>The Database Backup for WordPress plugin up to version 2.5.2 is vulnerable to unauthorized database export due to improper authorization enforcement, allowing unauthenticated attackers to export database tables in WordPress Multisite environments.</description><content:encoded><![CDATA[<p>The Database Backup for WordPress plugin, in versions up to and including 2.5.2, is vulnerable to an unauthorized database export flaw. This vulnerability, identified as CVE-2026-4029, stems from the plugin&rsquo;s failure to properly enforce the return value of its authorization check. The vulnerability specifically affects WordPress Multisite environments where the deprecated <code>is_site_admin()</code> function is present. Successful exploitation allows unauthenticated attackers to export database tables, potentially leading to sensitive information exposure. Defenders should ensure the plugin is updated to a version beyond 2.5.2 or implement compensating controls to restrict access to database export functionality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress Multisite instance using Database Backup for WordPress plugin version 2.5.2 or earlier.</li>
<li>Attacker crafts a malicious HTTP request to the plugin&rsquo;s database export functionality, bypassing the intended authorization checks.</li>
<li>The plugin&rsquo;s authorization check fails to properly validate the user&rsquo;s permissions due to improper enforcement of the return value.</li>
<li>The plugin initiates a database export operation.</li>
<li>The database tables are exported and made accessible to the unauthenticated attacker.</li>
<li>The attacker downloads the exported database, which contains sensitive information.</li>
<li>Attacker analyzes the database content to extract sensitive credentials, configuration details, or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4029 allows unauthenticated attackers to export sensitive database tables from vulnerable WordPress Multisite installations. This can lead to the exposure of usernames, passwords, API keys, customer data, and other confidential information stored in the database. The impact is high due to the potential for complete compromise of the affected WordPress site and the sensitive data it manages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Database Backup for WordPress plugin to the latest version (greater than 2.5.2) to patch CVE-2026-4029.</li>
<li>Monitor web server logs for suspicious requests to database export endpoints associated with the Database Backup for WordPress plugin, using the Sigma rule <code>Detect Unauthorized WordPress Database Export</code>.</li>
<li>In WordPress Multisite environments, investigate any unusual activity related to the <code>is_site_admin()</code> function or database backup operations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>wordpress</category><category>database backup</category><category>unauthenticated access</category><category>data exfiltration</category></item></channel></rss>