### [CVE-2024-7315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7315) ![](https://img.shields.io/static/v1?label=Product&message=Migration%2C%20Backup%2C%20Staging&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0.9.103%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-530%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere&color=brightgreen) ### Description The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups. ### POC #### Reference - https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/ #### Github - https://github.com/20142995/nuclei-templates - https://github.com/cyb3r-w0lf/nuclei-template-collection - https://github.com/fkie-cad/nvd-json-data-feeds