Skip to main content

CVE-2025-10306: CWE-73 External Control of File Name or Path in backupbolt Backup Bolt

Low
VulnerabilityCVE-2025-10306cvecve-2025-10306cwe-73
Published: Fri Oct 03 2025 (10/03/2025, 11:17:13 UTC)
Source: CVE Database V5
Vendor/Project: backupbolt
Product: Backup Bolt

Description

The Backup Bolt plugin for WordPress is vulnerable to arbitrary file downloads and backup location writes in all versions up to, and including, 1.4.1 via the process_backup_batch() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to download directories outside of the webroot and write backup zip files to arbitrary locations.

AI-Powered Analysis

AILast updated: 10/03/2025, 11:33:43 UTC

Technical Analysis

CVE-2025-10306 is a vulnerability identified in the Backup Bolt plugin for WordPress, affecting all versions up to and including 1.4.1. The vulnerability arises from improper external control of file names or paths (CWE-73) within the process_backup_batch() function. Specifically, authenticated attackers with Administrator-level privileges or higher can exploit this flaw to perform arbitrary file downloads and write backup ZIP files to arbitrary locations on the server. This means an attacker can download directories outside the webroot, potentially accessing sensitive files not intended for public exposure, and can also write backup files to any location, which could be leveraged for further attacks or persistence. The CVSS v3.1 base score is 3.8, indicating a low severity primarily due to the requirement for high privileges (Administrator access) and no user interaction needed. The attack vector is network-based, and the vulnerability does not affect availability but impacts confidentiality and integrity to a limited extent. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant in environments where Backup Bolt is used and where administrator accounts may be compromised or misused, as it could facilitate data exfiltration or unauthorized file manipulation.

Potential Impact

For European organizations using WordPress with the Backup Bolt plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of data stored on web servers. An attacker with administrator access could download sensitive files outside the webroot, including configuration files, credentials, or other protected data, leading to potential data breaches. Additionally, the ability to write backup files to arbitrary locations could be exploited to place malicious files or scripts, potentially aiding in lateral movement or persistence within the network. Although the vulnerability requires administrator-level access, which limits the attack surface, insider threats or compromised admin accounts could lead to exploitation. Organizations handling sensitive personal data under GDPR may face compliance risks if such data is exposed. The impact on availability is minimal, but the breach of confidentiality and integrity could have reputational and regulatory consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict administrator access to trusted personnel only, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of account compromise. 2) Monitor and audit administrator activities and backup operations for unusual file access or write patterns that could indicate exploitation attempts. 3) If possible, disable or remove the Backup Bolt plugin until a security patch is released. 4) Implement strict file system permissions on the server to limit the locations where backup files can be written, preventing arbitrary file writes outside designated directories. 5) Regularly update WordPress plugins and core software to incorporate security patches as soon as they become available. 6) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting backup functions. 7) Conduct internal security awareness training to highlight the risks of administrator account misuse and the importance of credential security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T22:18:40.873Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dfb274c3835a5fbe033bd5

Added to database: 10/3/2025, 11:24:36 AM

Last enriched: 10/3/2025, 11:33:43 AM

Last updated: 10/3/2025, 2:37:44 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats