The UpdraftPlus: WordPress Backup & Migration Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23.10. This is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action used to update Google Drive remote storage location. This makes it possible for unauthenticated attackers to modify the Google Drive location that backups are sent to via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can make it possible for attackers to receive backups for a site which may contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | UpdraftPlus <= 1.23.10 - Cross-Site Request Forgery to Google Drive Storage Update |
Wed, 05 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:29:02.795Z
Reserved: 2023-11-07T08:09:50.451Z
Link: CVE-2023-5982
Updated: 2024-08-02T08:14:25.154Z
Status : Modified
Published: 2023-11-07T21:15:14.193
Modified: 2026-04-08T19:18:53.660
Link: CVE-2023-5982
No data.
OpenCVE Enrichment
No data.