
Cloud Vulnerability DB
A community-led vulnerabilities database
An Authenticated Persistent Cross-Site Scripting (XSS) vulnerability was discovered in WordPress Backup Migration plugin versions 1.1.5 and below. The vulnerability was identified and disclosed on November 17, 2021, affecting users of the WordPress backup and migration plugin (Patchstack Advisory).
The vulnerability is tracked as CVE-2021-36884 and has been assigned a CVSS v3.1 base score of 5.4 (Medium) by NVD and 4.8 (Medium) by Patchstack. The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating that the vulnerability requires network access, low attack complexity, low privileges, and user interaction (NVD).
The vulnerability allows authenticated attackers to inject malicious scripts into the website, which can then be executed when other users visit the affected pages. This could lead to potential redirects, unwanted advertisements, and execution of other malicious HTML payloads (Patchstack Advisory).
The vulnerability was patched in version 1.1.6 of the WordPress Backup Migration plugin. Users are advised to update to version 1.1.6 or later to remediate this security issue (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."