Supsystic Backup 2.3.9 contains a local file inclusion vulnerability that allows unauthenticated attackers to read and delete arbitrary files by manipulating the download path parameter. Attackers can modify the download parameter in admin.php requests with directory traversal sequences to access sensitive files like /etc/passwd or delete files via the removeAction parameter.
https://www.vulncheck.com/advisories/wordpress-plugin-supsystic-backup-local-file-inclusion
https://www.exploit-db.com/exploits/49545
https://downloads.wordpress.org/plugin/backup-by-supsystic.zip
Published: 2026-05-16
Updated: 2026-05-16
Base Score: 4.9
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N
Severity: Medium
Base Score: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: Medium
Base Score: 6.9
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Severity: Medium