Skip to main content

CVE-2021-25022: CWE-79 Cross-site Scripting (XSS) in Unknown UpdraftPlus WordPress Backup Plugin

Medium
VulnerabilityCVE-2021-25022cvecve-2021-25022cwe-79
Published: Mon Jan 03 2022 (01/03/2022, 12:49:15 UTC)
Source: CVE
Vendor/Project: Unknown
Product: UpdraftPlus WordPress Backup Plugin

Description

The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.16.66 does not sanitise and escape the backup_timestamp and job_id parameter before outputting then back in admin pages, leading to Reflected Cross-Site Scripting issues

AI-Powered Analysis

AILast updated: 07/08/2025, 06:41:03 UTC

Technical Analysis

CVE-2021-25022 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the UpdraftPlus WordPress Backup Plugin versions prior to 1.16.66. The vulnerability arises because the plugin fails to properly sanitize and escape two parameters, namely 'backup_timestamp' and 'job_id', before reflecting them back in the WordPress admin pages. This improper handling allows an attacker to inject malicious scripts that execute in the context of the administrator's browser session. Since the vulnerability is reflected XSS, it requires the attacker to lure an authenticated admin user into clicking a crafted URL or visiting a malicious page. The CVSS 3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and partial impact on confidentiality and integrity (C:L/I:L), but no impact on availability (A:N). The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire WordPress admin environment. Although no known exploits are currently reported in the wild, the vulnerability poses a risk to WordPress sites using the UpdraftPlus plugin before version 1.16.66, especially those with multiple administrators or high-value content. Exploitation could lead to session hijacking, privilege escalation, or unauthorized actions performed with admin privileges due to script execution in the admin context.

Potential Impact

For European organizations, this vulnerability can have significant implications, particularly for those relying on WordPress for their corporate websites, intranets, or customer portals. The reflected XSS can be leveraged to steal administrator session cookies, enabling attackers to gain unauthorized access to the WordPress backend. This could lead to data breaches, defacement, or insertion of malicious content, undermining the organization's reputation and compliance with data protection regulations such as GDPR. The medium CVSS score reflects moderate risk; however, the impact can escalate if attackers combine this vulnerability with social engineering to target high-privilege users. Given the widespread use of WordPress and the popularity of UpdraftPlus as a backup solution, many European SMEs and larger enterprises could be affected. The vulnerability also poses risks to managed service providers and hosting companies offering WordPress hosting services, as compromise of one admin account could lead to broader access within shared environments.

Mitigation Recommendations

Organizations should immediately verify the version of the UpdraftPlus plugin installed on their WordPress sites and upgrade to version 1.16.66 or later, where the vulnerability is patched. If immediate upgrading is not feasible, administrators should restrict access to the WordPress admin interface by IP whitelisting or VPN-only access to reduce exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious query parameters containing script tags or suspicious payloads targeting 'backup_timestamp' and 'job_id' parameters can provide temporary protection. Additionally, administrators should enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of session hijacking. Regular security audits and monitoring of admin activity logs can help detect anomalous behavior indicative of exploitation attempts. Finally, educating administrators about phishing and social engineering risks can reduce the likelihood of successful exploitation via crafted URLs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2021-01-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f725b0acd01a2492647b8

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:41:03 AM

Last updated: 7/30/2025, 1:32:35 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats