CVE-2022-38079 Cross-Site Request Forgery (CSRF) vulnerability Backup Scheduler plugin <= 1.5.13 at WordPress.

A hacker can trick your visitors into executing unwanted actions on your website by sending them requests that look like the login request but are really different. For example, if you have login form on your website and your visitors enter wrong credentials, a hacker can send a request to your site that appears as an email and asks your user to log in. So, if your site has a vulnerable Backup Scheduler plugin, a hacker can send such a request and your website’s user will log in to the site with his/her credentials. You need to change that password immediately.

How to protect yourself from Backup Scheduler CSRF?

1. Update the plugin.

The most important thing is to update the plugin immediately after you found the vulnerability. Because if you don’t update the plugin, the hacker can use the request with the same success rate.

2. Don’t store any user data on your server.

As we said, if you are using Backup Scheduler plugin, you should change your password immediately. So, the hacker can use the request with the same success rate. Also, if you store any user data on your server, hacker can use the same request and access your server with the same success rate. So, you need to change the server data as well.

How to protect your website from Backup Scheduler CSS CSRF?

1. Check your website’s code for the presence of

Timeline

Published on: 09/23/2022 19:15:00 UTC
Last modified on: 09/26/2022 15:18:00 UTC

References