BackWPup – WordPress Backup & Restore Plugin Vulnerability (High) -…

BackWPup – WordPress Backup & Restore Plugin Vulnerability (High) -…

by | Feb 21, 2026 | Plugins

Attack Vectors

CVE-2025-15041 affects the BackWPup – WordPress Backup & Restore Plugin (slug: backwpup) in versions 5.0.0 through 5.6.2 and is rated High severity (CVSS 7.2, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

The primary attack path requires an attacker to already be authenticated in WordPress with elevated access (“level access and above”). In practical business terms, that can mean a compromised staff account, an abused vendor/agency login, or an internal user account that has more permissions than it should. From there, the attacker can exploit a missing capability check tied to how the plugin saves site-wide options.

A documented escalation route is to change WordPress settings so that user registration is enabled and the default role for new registrations becomes Administrator. That combination allows the attacker to register a new account and obtain full administrative control without needing further interaction from your team.

Security Weakness

The underlying issue is a missing capability check on the plugin’s use of save_site_option() across BackWPup versions 5.0.0 to 5.6.2. As reported, this enables unauthorized modification of data by allowing authenticated users meeting the stated access level to update arbitrary WordPress options.

Because WordPress options control critical security and operational settings, the ability to modify them can become a direct path to privilege escalation. This is particularly risky on sites where multiple users, contractors, or integrations have accounts, and where roles and permissions may not be tightly governed.

Technical or Business Impacts

If exploited, this vulnerability can lead to administrative takeover of the WordPress site. For leadership teams, the business risks typically include: loss of control over the website, unauthorized content changes, brand damage, customer trust erosion, and potential disruption of marketing campaigns and lead generation.

From a security and compliance perspective, administrator access can enable extensive follow-on actions: viewing or exporting sensitive data accessible through WordPress, changing site configuration, disabling security plugins, or interfering with backups and recovery processes. Even if no data is confirmed stolen, incident response, forensic work, and downtime can create measurable cost and operational impact.

Remediation: Update BackWPup to version 5.6.3 or a newer patched version as recommended by the source. You can review the CVE record here: https://www.cve.org/CVERecord?id=CVE-2025-15041. Additional details are available from Wordfence: https://www.wordfence.com/threat-intel/vulnerabilities/id/2ab8f440-2910-41a3-8bbc-afb4cafd33b5.

Similar Attacks

Privilege escalation and takeover via WordPress plugin weaknesses is a common theme in real-world incidents. Here are a few comparable examples (different products) where plugin issues enabled attackers to gain elevated access or take over sites:

ThemeGrill Demo Importer vulnerability (Wordfence analysis) — a widely discussed case involving site takeover risk through a plugin weakness.

Elementor Pro vulnerabilities (Wordfence analysis) — examples of plugin issues that could enable unauthorized actions depending on configuration and access.

Elementor Website Builder 0-day coverage (Wordfence analysis) — illustrates how quickly WordPress plugin issues can become actively exploited and disruptive.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers