CVE-2025-28954
📋 TL;DR
A Cross-Site Request Forgery (CSRF) vulnerability in the wphobby Backwp WordPress plugin allows attackers to trick authenticated administrators into performing unauthorized actions, specifically arbitrary file deletion via path traversal. This affects all WordPress sites running Backwp plugin versions up to 2.0.2. Attackers can delete critical files when administrators visit malicious web pages while logged in.
💻 Affected Systems
- wphobby Backwp WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete site compromise through deletion of WordPress core files, configuration files, or database backups, leading to permanent data loss and site unavailability.
Likely Case
Selective file deletion causing site functionality disruption, content loss, or defacement through removal of theme/plugin files.
If Mitigated
No impact if proper CSRF protections are implemented or administrators don't visit malicious sites while authenticated.
🎯 Exploit Status
Exploitation requires social engineering to trick administrators into visiting malicious pages. The technical exploit is simple once the administrator is lured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Backwp plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.0.3+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Backwp Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate backwp
Implement CSRF Protection Headers
linuxAdd security headers to WordPress to help prevent CSRF attacks
Add to .htaccess: Header set X-Frame-Options "SAMEORIGIN"
Add to .htaccess: Header set Content-Security-Policy "frame-ancestors 'self'"
🧯 If You Can't Patch
- Remove Backwp plugin entirely if not essential
- Implement strict access controls: limit administrator accounts, use separate browsers for admin vs browsing, enforce strong authentication
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Backwp version. If version is 2.0.2 or lower, you are vulnerable.
Check Version:
wp plugin get backwp --field=version
Verify Fix Applied:
Verify Backwp plugin version is 2.0.3 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unexpected file deletion events in WordPress debug logs
- 404 errors for known existing files
- Plugin activation/deactivation logs for Backwp
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with file deletion parameters from unexpected referrers
SIEM Query:
source="wordpress.log" AND ("file deleted" OR "unlink" OR "rmdir") AND plugin="backwp"