Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3034: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in willmot BackUpWordPress

0
Low
VulnerabilityCVE-2024-3034cvecve-2024-3034cwe-22
Published: Sat Apr 27 2024 (04/27/2024, 04:33:28 UTC)
Source: CVE Database V5
Vendor/Project: willmot
Product: BackUpWordPress

Description

CVE-2024-3034 is a path traversal vulnerability in the BackUpWordPress plugin for WordPress, affecting all versions up to 3. 13. It allows authenticated users with administrator-level privileges or higher to traverse directories outside the intended plugin scope via the hmbkp_directory_browse parameter. The vulnerability does not require user interaction beyond authentication and has a low CVSS score of 2. 7, indicating limited impact primarily on confidentiality. There are no known exploits in the wild at this time. Organizations using this plugin should apply patches or implement access controls to mitigate potential risks. The threat mainly affects WordPress sites with this plugin installed, especially those with multiple administrators. Countries with high WordPress usage and significant web hosting industries are more likely to be impacted. Although the vulnerability is low severity, it still warrants attention due to the potential for unauthorized directory access by privileged users.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:00:33 UTC

Technical Analysis

CVE-2024-3034 is a directory traversal vulnerability classified under CWE-22, found in the BackUpWordPress plugin developed by willmot. This vulnerability exists in all versions up to and including 3.13. It arises from improper limitation of the pathname in the hmbkp_directory_browse parameter, which allows an authenticated attacker with administrator-level privileges or higher to traverse directories outside the intended restricted directory context. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS 3.1 base score is 2.7, reflecting low severity due to limited confidentiality impact and no impact on integrity or availability. The vulnerability allows reading of files outside the plugin's directory scope, potentially exposing sensitive configuration or system files. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability affects WordPress sites using the BackUpWordPress plugin, which is widely used for backup management. The attack requires high privileges, limiting the risk to users who already have administrative access, but it can still facilitate further information disclosure or lateral movement within the compromised environment.

Potential Impact

The primary impact of CVE-2024-3034 is limited unauthorized disclosure of file system information outside the plugin's intended directory scope. Since exploitation requires administrator-level access, the vulnerability does not elevate privileges but can aid attackers in gathering sensitive configuration files or other data that may assist in further attacks. This could lead to increased risk of data leakage or facilitate lateral movement within the compromised WordPress environment. The vulnerability does not affect system integrity or availability directly, nor does it allow remote unauthenticated exploitation. Organizations with multiple administrators or shared admin credentials are at higher risk, as any compromised admin account could be leveraged to exploit this flaw. The impact is more significant in environments where sensitive data is stored on the same server as WordPress or where backup files contain critical information. Overall, the threat is moderate in scope but low in severity due to the required privileges and limited impact.

Mitigation Recommendations

To mitigate CVE-2024-3034, organizations should first ensure that only trusted users have administrator-level access to WordPress instances. Implement strict access controls and monitor administrative account usage for suspicious activity. Update the BackUpWordPress plugin to the latest version once a patch addressing this vulnerability is released by the vendor. Until a patch is available, consider restricting access to the plugin's functionality via web application firewalls or server-level access controls to limit the ability to manipulate the hmbkp_directory_browse parameter. Additionally, conduct regular audits of backup directories and file permissions to ensure sensitive files are not exposed unnecessarily. Employ security plugins that monitor and alert on suspicious directory traversal attempts. Finally, maintain comprehensive logging and monitoring to detect any exploitation attempts promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-03-27T20:39:36.417Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8ab7ef31ef0b56612a

Added to database: 2/25/2026, 9:41:30 PM

Last enriched: 2/26/2026, 6:00:33 AM

Last updated: 2/26/2026, 8:08:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats