<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2023-54346 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2023-54346/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2023-54346/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Backup Migration Plugin Unauthenticated Database Backup Download</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-backup-migration-info-disclosure/</link><pubDate>Tue, 05 May 2026 12:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-backup-migration-info-disclosure/</guid><description>WordPress Plugin Backup Migration 1.2.8 contains an information disclosure vulnerability allowing unauthenticated attackers to download complete database backups by accessing predictable file paths.</description><content:encoded><![CDATA[<p>WordPress Plugin Backup Migration 1.2.8 is vulnerable to information disclosure. Unauthenticated attackers can exploit this flaw to download complete database backups by accessing predictable file paths. The vulnerability, identified as CVE-2023-54346, allows attackers to enumerate backup directories through configuration files and logs. This enumeration enables the construction of direct download URLs, which, when accessed, retrieve sensitive backup archives containing full database dumps. This poses a significant risk to WordPress sites using the affected plugin version, as it allows unauthorized access to sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Backup Migration plugin version 1.2.8.</li>
<li>Attacker accesses publicly available configuration files (e.g., wp-config.php) to gather information about the site&rsquo;s structure.</li>
<li>The attacker attempts to access log files created by the Backup Migration plugin to identify backup directory names.</li>
<li>Attacker identifies predictable file paths for backup files based on the enumerated backup directory names.</li>
<li>The attacker constructs direct download URLs for backup archive files (e.g., .zip or .sql) based on the identified paths.</li>
<li>The attacker sends an HTTP GET request to the constructed URL.</li>
<li>The server responds with the backup archive file containing the complete WordPress database.</li>
<li>Attacker downloads and extracts the database backup, gaining access to sensitive information, including user credentials, site configuration, and potentially other data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to download complete WordPress database backups, potentially exposing sensitive information such as user credentials, configuration details, and proprietary data. The impact is significant, as it could lead to account compromise, data theft, and further malicious activities. This vulnerability affects all WordPress sites using the Backup Migration plugin version 1.2.8 that have not applied a patch.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Backup Directory Enumeration</code> to identify potential attempts to discover backup directories by monitoring web server logs for suspicious file requests.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Backup File Download</code> to detect direct downloads of backup files by monitoring web server logs for requests to common backup file extensions within the WordPress content directory.</li>
<li>Upgrade the Backup Migration plugin to a version that addresses CVE-2023-54346.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>information-disclosure</category><category>wordpress</category><category>cve-2023-54346</category></item></channel></rss>