Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-9396 | The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site. |
Tue, 23 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mywebsiteadvisor
Mywebsiteadvisor simple Backup |
|
| CPEs | cpe:2.3:a:mywebsiteadvisor:simple_backup:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Mywebsiteadvisor
Mywebsiteadvisor simple Backup |
Mon, 21 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 19 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Simple Backup plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, and including, 2.7.10. via the download_backup_file function. This is due to a lack of capability checks and file type validation. This makes it possible for attackers to download sensitive files such as the wp-config.php file from the affected site. | |
| Title | Simple Backup <= 2.7.10 - Arbitrary File Download via Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:43:17.745Z
Reserved: 2025-07-18T21:16:55.177Z
Link: CVE-2015-10134
Updated: 2025-07-21T18:11:33.505Z
Status : Analyzed
Published: 2025-07-19T10:15:23.420
Modified: 2025-12-23T17:01:42.540
Link: CVE-2015-10134
No data.
OpenCVE Enrichment
No data.
EUVD