CVE-2024-8669
📋 TL;DR
This SQL injection vulnerability in the Backuply WordPress plugin allows authenticated attackers with administrator privileges to execute arbitrary SQL queries. Attackers can extract sensitive database information including user credentials, configuration data, and other protected content. All WordPress sites using Backuply version 1.3.4 or earlier are affected.
💻 Affected Systems
- Backuply – Backup, Restore, Migrate and Clone WordPress plugin
📦 What is this software?
Backuply by Softaculous
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to credential theft, data exfiltration, privilege escalation, and potential site takeover.
Likely Case
Sensitive data extraction including user credentials, configuration secrets, and personal information from the database.
If Mitigated
Limited impact if proper access controls restrict administrator accounts and database permissions are minimized.
🎯 Exploit Status
Exploitation requires administrator credentials. The vulnerability is in a publicly accessible function with insufficient input sanitization.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.5
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3151205/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Backuply and click 'Update Now'. 4. Verify version shows 1.3.5 or higher.
🔧 Temporary Workarounds
Disable Backuply Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate backuply
Restrict Administrator Access
allLimit administrator accounts and implement strong authentication controls
🧯 If You Can't Patch
- Remove administrator access from untrusted users and implement strict access controls
- Implement web application firewall rules to block SQL injection patterns targeting the backuply_wp_clone_sql function
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Backuply version. If version is 1.3.4 or lower, you are vulnerable.
Check Version:
wp plugin get backuply --field=version
Verify Fix Applied:
After updating, verify Backuply version shows 1.3.5 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in WordPress or database logs containing 'backuply_wp_clone_sql'
- Multiple failed administrator login attempts followed by successful login
Network Indicators:
- POST requests to WordPress admin-ajax.php with 'action=backuply_wp_clone_sql' containing SQL injection patterns
SIEM Query:
source="wordpress.log" AND "backuply_wp_clone_sql" AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE")