BackWPup – WordPress Backup & Restore Plugin Vulnerability (High) -…

BackWPup – WordPress Backup & Restore Plugin Vulnerability (High) -…

by | Feb 18, 2026 | Plugins

Attack Vectors

CVE-2025-15041 affects the BackWPup – WordPress Backup & Restore Plugin (slug: backwpup) in versions up to and including 5.6.2, and is rated High severity (CVSS 7.2). The issue is an authenticated privilege escalation path, meaning an attacker must be able to log in to your WordPress site with at least a low-level user account.

Once logged in, the attacker can exploit a missing capability check tied to how the plugin handles updates to site options. In practical terms, this can allow them to change sensitive site settings that are normally restricted, including settings related to user registration and default roles.

Security Weakness

The underlying weakness is a missing capability check on the plugin’s use of save_site_option() in BackWPup versions up to 5.6.2. Because the required permission validation is not enforced, an authenticated user with sufficient access can update arbitrary WordPress site options.

This matters because WordPress options control security-critical behavior. According to the published vulnerability details, an attacker can potentially enable user registration and set the default role for new registrations to administrator, creating a straightforward route to administrative control without needing to compromise an existing admin account.

Technical or Business Impacts

If exploited, this vulnerability can lead to full administrative access to your WordPress environment, which is typically equivalent to a complete site takeover. From a business-risk perspective, that can translate into defacement, unauthorized content changes, SEO spam, redirection of marketing traffic, and disruption to lead generation and customer trust.

Administrative access can also expose sensitive data handled by the site and its plugins (for example, contact form submissions and other stored business information), increase compliance exposure, and create costly incident response needs. For marketing leadership and executives, the biggest risks are brand damage, revenue impact from downtime or traffic diversion, and potential regulatory or contractual consequences if personal data is affected.

Remediation: Update BackWPup – WordPress Backup & Restore Plugin to version 5.6.3 or newer (patched). Track the CVE record here: https://www.cve.org/CVERecord?id=CVE-2025-15041. Reference: Wordfence vulnerability advisory.

Similar Attacks

Privilege escalation and access-control failures in WordPress plugins have been repeatedly abused to take over websites and monetize traffic. Public examples and disclosures to review include:

Essential Addons for Elementor privilege escalation disclosure (Wordfence)
Elementor Pro vulnerability exploited in the wild (Wordfence)
CISA advisory on attacks against unpatched web vulnerabilities (AA22-138B)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers