On Feb 14, 2022, A security researcher, Marc-Alexandre from Jetpack, discovered a high severity vulnerability in the UpdraftPlus WordPress plugin. The flaw tracked as CVE-2022-0633 with a base score of 8.5 lets the attacker download the WordPress site backup files with sensitive data. This could lead the attacker to take control of the website. WordPress site owners who use this plugin will need to pay attention to this post as we are going to explain how to fix CVE-2022-0633- An Authenticated Backup Download Vulnerability in UpdraftPlus WordPress Plugin.
UpdraftPlus plugin is the world’s highest-ranking and most popular backup service. The plugin offers full, manual, or scheduled backup of the whole WordPress site (files, databases, plugins, and themes ) to any location from local drive to remote cloud storage such as OneDrive, DropBox, GoogleDrive, Amazon S3 storage, and many more just with one click.
According to the security researcher Marc Montpas, The CVE-2022-0633 vulnerability allows any logged-in user, just with subscriber-level access, to download the backups created by the UpdraftPlus plugin.
Research says that the plugin uses the parameters ‘nonce’ and ‘timestamps’ to identify the created backups. These parameters are created to validate the admin users properly and provide access to the backup files. The actual vulnerability exists in the improper implementation of the validation process, which failed to identify the admin users. This hole created a way for attackers to craft a malicious request to get access to information about the site’s latest backup to date and backup’s nonce.
Attackers will have access to WordPress configuration files, database files, media files, themes, and everything that backup file stores upon successful exploitation of this vulnerability. If an attacker manages to obtain credentials stored in the database, the attacker could take over the complete WordPress website.
This flaw puts more than 3 million websites at risk of stealing website backup files. You can imagine the potential of the flaw from its numbers. Please read the full details from here.
Associated CVE ID | CVE-2022-0633 |
Description | An Authenticated Backup Download Vulnerability in UpdraftPlus WordPress Plugin |
Associated ZDI ID | – |
CVSS Score | 8.5 High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Network |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Scope | Changed |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | High |
All the versions of the UpdraftPlus plugins are from 1.16.7 to 1.22.2 are vulnerable to the flaw. It is good to take swift action to fix the CVE-2022-0633 Vulnerability.
UpdraftPlus has released version 1.22.3 for patching the vulnerability. UpdraftPlus has pushed the forced auto-updates due to the severity of the issue. We urge you to verify the current version of the UpdraftPlus on your WordPress website and update the plugin to version 1.22.3 / 2.22.3 or later. You can find UpdraftPlus’s official advisory here.
You don’t have to manually upgrade the plugin if you have enabled the auto-upgrade option. Follow the simple procedure to upgrade the plugin manually.
Step 1. Log in to the WordPress Admin page
Step 2. Select ‘Plugin’ option from the left-hand site options
Step 3. Upgrade the Plugin
Select the ‘Enable auto-updates option to receive automatic updates. Or Click on the ‘Update Now’ option right below the plugin. However, the ‘Update Now’ option will only be available when the Plugin Author rolls out an update.
For a WordPress website, it is mandatory to keep all the plugins up to date. But, updating plugins are not enough to protect your WordPress website. We highly recommend taking the subscription of security solutions such as Jetpack and WordFence.
Both Jetpack and Wordfence will always work hard to protect your WordPress website from such threats and vulnerabilities. If you are using Jetpack on your website, we recommend subscribing to their Jetpack Security plan, covering malicious file scanning and backups. Suppose you have been using Wordfence Premium on your WordPress website. In that case, your website is protected from any exploits targeting this vulnerability as Wordfence already implemented the firewall rule on Feb 17, 2022, for Premium subscribers. Wordfence said that their free subscribers would receive this update after 30 days, on Mar 19, 2022.
We hope this post would help you know How to Fix CVE-2022-0633- An Authenticated Backup Download Vulnerability in UpdraftPlus WordPress Plugin. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How to Fix CVE-2022-1329- A Critical Remote Code Execution Vulnerability In Elementor
How To Fix Critical Remote Code Execution Vulnerabilities In PHP Everywhere WordPress Plugin
CVE-2022-0513- Fix The Critical SQL Injection Vulnerability In WP Statistics WordPress Plugin
How To Fix A Code Injection Vulnerability In Ninja Forms WordPress Plugin
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.