CVE-2025-12394
Description
The Backup Migration WordPress plugin before 2.0.0 does not properly generate its backup path in certain server configurations, allowing unauthenticated users to fetch a log that discloses the backup filename. The backup archive is then downloadable without authentication.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Backup Migration plugin before 2.0.0 exposes backup filenames via a log file, allowing unauthenticated download of the entire backup archive.
The Backup Migration WordPress plugin versions before 2.0.0 contain a vulnerability where the backup path is not properly generated under certain server configurations. This flaw allows an unauthenticated attacker to access a log file that discloses the filename of the most recent backup archive [1].
Exploitation requires no authentication or special privileges; an attacker can simply request the log file to obtain the backup filename, then use that information to directly download the backup archive from the server [1]. The lack of access controls on both the log and the backup file makes this a straightforward path to data exposure.
The impact is significant: the downloaded backup archive typically contains the entire WordPress installation, including database credentials, user data, uploaded files, and configuration settings. With this information, an attacker could potentially compromise the site, exfiltrate sensitive data, or gain persistent access [1].
The vulnerability has been fixed in version 2.0.0 of the plugin. Users running an earlier version should update immediately to prevent potential exploitation [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <2.0.0
- Range: <2.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.