CVE-2024-13609
Published: 18 February 2025
Summary
CVE-2024-13609 is a medium-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in 1Clickmigration 1 Click Migration. Its CVSS base score is 5.9 (Medium).
Operationally, ranked in the top 4.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and AU-13 (Monitoring for Information Disclosure).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation via the available patch in WordPress plugin changeset 3372639 directly corrects the flaw in class-ocm-backup.php that exposes sensitive data during backups.
Restricts publication of sensitive backup content on publicly accessible WordPress systems, preventing unauthenticated extraction of usernames and password hashes.
Monitors for unauthorized disclosure of sensitive information like usernames and password hashes during the backup process window.
NVD Description
The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2 via the class-ocm-backup.php. This makes it possible for unauthenticated attackers…
more
to extract sensitive data including usernames and their respective password hashes during a short window of time in which the backup is in process.
Deeper analysisAI
CVE-2024-13609 is a sensitive information exposure vulnerability (CWE-200) affecting the 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress, in all versions up to and including 2.2. The flaw is located in the class-ocm-backup.php component and has a CVSS v3.1 base score of 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating network accessibility with high attack complexity but high confidentiality impact.
Unauthenticated attackers can exploit the vulnerability during a short window of time while a backup process is active, enabling them to extract sensitive data such as usernames and their corresponding password hashes from the plugin.
Advisories from Wordfence provide further details on the vulnerability, while a patch is available in WordPress plugin changeset 3372639. The affected source code in class-ocm-backup.php can be reviewed via the plugin's Trac browser.
Details
- CWE(s)