Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-4208Path Traversal in Wordpress

5 documents5 sources
Severity
5.0MEDIUMNVD
EPSS
27.2%
top 3.60%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 17
Latest updateMay 1

Description

Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wordpress< wordpress 2.0.5-0.1 (bookworm)
Debianwordpress/wordpress< 2.0.5-0.1+3

🔴Vulnerability Details

2
GHSA
GHSA-86h8-mw8r-2c75: Directory traversal vulnerability in wp-db-backup2022-05-01
OSV
CVE-2006-4208: Directory traversal vulnerability in wp-db-backup2006-08-17

💥Exploits & PoCs

1
Exploit-DB
WordPress Plugin WP-DB Backup 1.6/1.7 - 'edit.php' Directory Traversal2006-08-14

📋Vendor Advisories

1
Debian
CVE-2006-4208: wordpress - Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plu...2006