CVE-2024-13911
📋 TL;DR
The Database Backup and check Tables Automated With Scheduler 2024 WordPress plugin exposes sensitive database credentials to authenticated administrators through the /dashboard/backup.php file. This vulnerability allows attackers with administrator access to extract full database credentials, potentially leading to complete database compromise. All WordPress sites using this plugin up to version 2.35 are affected.
💻 Affected Systems
- Database Backup and check Tables Automated With Scheduler 2024 WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete database takeover, data exfiltration, privilege escalation to database administrator, and potential lateral movement to other systems using the same credentials.
Likely Case
Database credential theft leading to unauthorized database access, data manipulation, and potential site defacement or data theft.
If Mitigated
Limited impact if proper access controls, network segmentation, and credential rotation are implemented, though credentials would still be exposed.
🎯 Exploit Status
Exploitation requires authenticated administrator access. Attackers with compromised admin accounts can easily access the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 2.36 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Database Backup and check Tables Automated With Scheduler 2024'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.36+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate database-backup
Restrict access to backup.php
linuxBlock access to the vulnerable file via web server configuration
# Apache: <Location /wp-content/plugins/database-backup/dashboard/backup.php> Require all denied </Location>
# Nginx: location ~ /wp-content/plugins/database-backup/dashboard/backup.php { deny all; }
🧯 If You Can't Patch
- Implement strict access controls and monitor administrator accounts for suspicious activity
- Rotate database credentials immediately and ensure they are not reused elsewhere
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Database Backup and check Tables Automated With Scheduler 2024' version 2.35 or lower
Check Version:
wp plugin get database-backup --field=version
Verify Fix Applied:
Verify plugin version is 2.36 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual access to /wp-content/plugins/database-backup/dashboard/backup.php
- Multiple failed login attempts followed by successful admin login
- Database connection attempts from unexpected IP addresses
Network Indicators:
- HTTP requests to backup.php endpoint from admin accounts
- Outbound database connections from web server to external hosts
SIEM Query:
source="web_access.log" AND uri="/wp-content/plugins/database-backup/dashboard/backup.php"
🔗 References
- https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L62
- https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L63
- https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L64
- https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L65
- https://plugins.trac.wordpress.org/browser/database-backup/trunk/dashboard/backup.php#L66
- https://plugins.trac.wordpress.org/changeset/3247917/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c548b70a-8566-4aaf-a3a2-fce6c19e6a0c?source=cve