CVE-2021-25022: CWE-79 Cross-site Scripting (XSS) in Unknown UpdraftPlus WordPress Backup Plugin
The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.16.66 does not sanitise and escape the backup_timestamp and job_id parameter before outputting then back in admin pages, leading to Reflected Cross-Site Scripting issues
AI Analysis
Technical Summary
CVE-2021-25022 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the UpdraftPlus WordPress Backup Plugin versions prior to 1.16.66. The vulnerability arises because the plugin fails to properly sanitize and escape two parameters, namely 'backup_timestamp' and 'job_id', before reflecting them back in the WordPress admin pages. This improper handling allows an attacker to inject malicious scripts that execute in the context of the administrator's browser session. Since the vulnerability is reflected XSS, it requires the attacker to lure an authenticated admin user into clicking a crafted URL or visiting a malicious page. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L), but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire WordPress admin environment. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to WordPress sites using the UpdraftPlus plugin before version 1.16.66, especially those with multiple administrators or high-value content. Exploitation could lead to session hijacking, privilege escalation, or unauthorized actions performed with admin privileges due to script execution in the admin context.
Potential Impact
For European organizations, this vulnerability can have significant implications, particularly for those relying on WordPress for their corporate websites, intranets, or customer portals. The reflected XSS can be leveraged to steal administrator session cookies, enabling attackers to gain unauthorized access to the WordPress backend. This could lead to data breaches, defacement, or insertion of malicious content, undermining the organization's reputation and compliance with data protection regulations such as GDPR. The medium CVSS score reflects moderate risk; however, the impact can escalate if attackers combine this vulnerability with social engineering to target high-privilege users. Given the widespread use of WordPress and the popularity of UpdraftPlus as a backup solution, many European SMEs and larger enterprises could be affected. The vulnerability also poses risks to managed service providers and hosting companies offering WordPress hosting services, as compromise of one admin account could lead to broader access within shared environments.
Mitigation Recommendations
Organizations should immediately verify the version of the UpdraftPlus plugin installed on their WordPress sites and upgrade to version 1.16.66 or later, where the vulnerability is patched. If immediate upgrading is not feasible, administrators should restrict access to the WordPress admin interface by IP whitelisting or VPN-only access to reduce exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious query parameters containing script tags or suspicious payloads targeting 'backup_timestamp' and 'job_id' parameters can provide temporary protection. Additionally, administrators should enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of session hijacking. Regular security audits and monitoring of admin activity logs can help detect anomalous behavior indicative of exploitation attempts. Finally, educating administrators about phishing and social engineering risks can reduce the likelihood of successful exploitation via crafted URLs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2021-25022: CWE-79 Cross-site Scripting (XSS) in Unknown UpdraftPlus WordPress Backup Plugin
Description
The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.16.66 does not sanitise and escape the backup_timestamp and job_id parameter before outputting then back in admin pages, leading to Reflected Cross-Site Scripting issues
AI-Powered Analysis
Technical Analysis
CVE-2021-25022 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the UpdraftPlus WordPress Backup Plugin versions prior to 1.16.66. The vulnerability arises because the plugin fails to properly sanitize and escape two parameters, namely 'backup_timestamp' and 'job_id', before reflecting them back in the WordPress admin pages. This improper handling allows an attacker to inject malicious scripts that execute in the context of the administrator's browser session. Since the vulnerability is reflected XSS, it requires the attacker to lure an authenticated admin user into clicking a crafted URL or visiting a malicious page. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L), but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire WordPress admin environment. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to WordPress sites using the UpdraftPlus plugin before version 1.16.66, especially those with multiple administrators or high-value content. Exploitation could lead to session hijacking, privilege escalation, or unauthorized actions performed with admin privileges due to script execution in the admin context.
Potential Impact
For European organizations, this vulnerability can have significant implications, particularly for those relying on WordPress for their corporate websites, intranets, or customer portals. The reflected XSS can be leveraged to steal administrator session cookies, enabling attackers to gain unauthorized access to the WordPress backend. This could lead to data breaches, defacement, or insertion of malicious content, undermining the organization's reputation and compliance with data protection regulations such as GDPR. The medium CVSS score reflects moderate risk; however, the impact can escalate if attackers combine this vulnerability with social engineering to target high-privilege users. Given the widespread use of WordPress and the popularity of UpdraftPlus as a backup solution, many European SMEs and larger enterprises could be affected. The vulnerability also poses risks to managed service providers and hosting companies offering WordPress hosting services, as compromise of one admin account could lead to broader access within shared environments.
Mitigation Recommendations
Organizations should immediately verify the version of the UpdraftPlus plugin installed on their WordPress sites and upgrade to version 1.16.66 or later, where the vulnerability is patched. If immediate upgrading is not feasible, administrators should restrict access to the WordPress admin interface by IP whitelisting or VPN-only access to reduce exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious query parameters containing script tags or suspicious payloads targeting 'backup_timestamp' and 'job_id' parameters can provide temporary protection. Additionally, administrators should enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of session hijacking. Regular security audits and monitoring of admin activity logs can help detect anomalous behavior indicative of exploitation attempts. Finally, educating administrators about phishing and social engineering risks can reduce the likelihood of successful exploitation via crafted URLs.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2021-01-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f725b0acd01a2492647b8
Added to database: 5/22/2025, 6:52:11 PM
Last enriched: 7/8/2025, 6:41:03 AM
Last updated: 2/7/2026, 11:02:19 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.