CVE-2025-10579: CWE-862 Missing Authorization in wp_media BackWPup – WordPress Backup & Restore Plugin
The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'backwpup_working' AJAX action in all versions up to, and including, 5.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve access to a back-up's filename while a backup is running. This information has little value on it's own, but could be used to aid in a brute force attack to retrieve back-up contents in limited environments (i.e. NGINX).
AI Analysis
Technical Summary
CVE-2025-10579 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BackWPup – WordPress Backup & Restore Plugin, widely used for backing up WordPress sites. The flaw arises from the absence of a proper capability check on the 'backwpup_working' AJAX action, which is accessible to any authenticated user with Subscriber-level privileges or higher. This action reveals the filename of a backup file while a backup operation is in progress. Although the filename alone does not directly expose backup contents, it can be leveraged by attackers to mount brute force attacks against backup files, particularly in environments where web server configurations (e.g., NGINX) might allow such attempts. The vulnerability affects all versions up to and including 5.5.0 of the plugin. Exploitation requires authentication but no additional user interaction, and the attack vector is network-based. The CVSS v3.1 score is 5.3, indicating medium severity, with high impact on confidentiality but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a relevant concern for website administrators. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality of backup data. Organizations relying on the BackWPup plugin for WordPress site backups could have sensitive backup filenames exposed to low-privileged authenticated users, such as subscribers or contributors. This exposure could facilitate targeted brute force attacks to retrieve backup contents, potentially leading to data leakage of website content, configuration, or user data. The impact is more pronounced for organizations with limited web server protections or those using NGINX configurations susceptible to brute force attacks on backup files. Since WordPress powers a significant portion of European websites, including small and medium enterprises, NGOs, and public sector sites, the risk of data exposure is non-trivial. However, the requirement for authenticated access limits the attack surface to users who already have some level of access, reducing the likelihood of external attackers exploiting this vulnerability directly. Nonetheless, insider threats or compromised low-privilege accounts could leverage this flaw to escalate data exposure.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the BackWPup plugin version 5.5.0 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should restrict access to the WordPress backend to trusted users only and review user roles to minimize the number of accounts with Subscriber-level or higher privileges. Implementing strict web server rules to prevent unauthorized access to backup files, such as denying direct HTTP access to backup directories or files, is critical. Additionally, monitoring and logging AJAX requests to detect unusual access patterns to the 'backwpup_working' action can help identify exploitation attempts. Employing multi-factor authentication (MFA) for all WordPress users reduces the risk of account compromise. Finally, consider temporarily disabling the BackWPup plugin if backups can be managed through alternative secure methods until a fix is released.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10579: CWE-862 Missing Authorization in wp_media BackWPup – WordPress Backup & Restore Plugin
Description
The BackWPup – WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'backwpup_working' AJAX action in all versions up to, and including, 5.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve access to a back-up's filename while a backup is running. This information has little value on it's own, but could be used to aid in a brute force attack to retrieve back-up contents in limited environments (i.e. NGINX).
AI-Powered Analysis
Technical Analysis
CVE-2025-10579 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BackWPup – WordPress Backup & Restore Plugin, widely used for backing up WordPress sites. The flaw arises from the absence of a proper capability check on the 'backwpup_working' AJAX action, which is accessible to any authenticated user with Subscriber-level privileges or higher. This action reveals the filename of a backup file while a backup operation is in progress. Although the filename alone does not directly expose backup contents, it can be leveraged by attackers to mount brute force attacks against backup files, particularly in environments where web server configurations (e.g., NGINX) might allow such attempts. The vulnerability affects all versions up to and including 5.5.0 of the plugin. Exploitation requires authentication but no additional user interaction, and the attack vector is network-based. The CVSS v3.1 score is 5.3, indicating medium severity, with high impact on confidentiality but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability's presence in a popular WordPress plugin makes it a relevant concern for website administrators. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality of backup data. Organizations relying on the BackWPup plugin for WordPress site backups could have sensitive backup filenames exposed to low-privileged authenticated users, such as subscribers or contributors. This exposure could facilitate targeted brute force attacks to retrieve backup contents, potentially leading to data leakage of website content, configuration, or user data. The impact is more pronounced for organizations with limited web server protections or those using NGINX configurations susceptible to brute force attacks on backup files. Since WordPress powers a significant portion of European websites, including small and medium enterprises, NGOs, and public sector sites, the risk of data exposure is non-trivial. However, the requirement for authenticated access limits the attack surface to users who already have some level of access, reducing the likelihood of external attackers exploiting this vulnerability directly. Nonetheless, insider threats or compromised low-privilege accounts could leverage this flaw to escalate data exposure.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the BackWPup plugin version 5.5.0 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should restrict access to the WordPress backend to trusted users only and review user roles to minimize the number of accounts with Subscriber-level or higher privileges. Implementing strict web server rules to prevent unauthorized access to backup files, such as denying direct HTTP access to backup directories or files, is critical. Additionally, monitoring and logging AJAX requests to detect unusual access patterns to the 'backwpup_working' action can help identify exploitation attempts. Employing multi-factor authentication (MFA) for all WordPress users reduces the risk of account compromise. Finally, consider temporarily disabling the BackWPup plugin if backups can be managed through alternative secure methods until a fix is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-16T19:37:30.649Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68fc525a9a6ac51d5490d28f
Added to database: 10/25/2025, 4:30:18 AM
Last enriched: 10/25/2025, 4:45:27 AM
Last updated: 10/25/2025, 5:58:56 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12221: CWE-16: Common Vulnerabilities in Software Configuration in Azure Access Technology BLU-IC2
LowCVE-2025-12220: CWE-1395: Dependency on Vulnerable Third-Party Component in Azure Access Technology BLU-IC2
CriticalCVE-2025-12219: CWE-1395: Dependency on Vulnerable Third-Party Component in Azure Access Technology BLU-IC2
CriticalCVE-2025-12218: CWE-1392: Use of Default Credentials in Azure Access Technology BLU-IC2
CriticalCVE-2025-12216: CWE-1301: Insufficient or Incomplete Data Removal within Hardware Component in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.