CVE-2025-10306
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Backup Bolt plugin for WordPress is vulnerable to arbitrary file downloads and backup location writes in all versions up to, and including, 1.4.1 via the process_backup_batch() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to download directories outside of the webroot and write backup zip files to arbitrary locations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress backup_bolt *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-73 The product allows user input to control or influence paths or file names that are used in filesystem operations.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Backup Bolt plugin for WordPress allows authenticated users with Administrator-level access or higher to download files from directories outside the webroot and to write backup zip files to arbitrary locations on the server. This occurs through the process_backup_batch() function in versions up to and including 1.4.1.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with Administrator-level access to download sensitive files from the server that are outside the webroot, potentially exposing confidential data. Additionally, the attacker can write backup zip files to arbitrary locations, which could be used to overwrite important files or place malicious files on the server, leading to data integrity issues or further exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart